Siga este enlace para ver otros tipos de publicaciones sobre el tema: All-digital protection.

Artículos de revistas sobre el tema "All-digital protection"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "All-digital protection".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Jiang, Kai y Chanan Singh. "Reliability Modeling of All-Digital Protection Systems Including Impact of Repair". IEEE Transactions on Power Delivery 25, n.º 2 (abril de 2010): 579–87. http://dx.doi.org/10.1109/tpwrd.2009.2034783.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Egorov, E. A., Zh A. Shadrina, G. A. Kochyan, M. E. Podgornaya y A. V. Vasilchenko. "The role of digital technologies in the management of production and technological processes in fruit growing (protection of fruit plantations and yield) on the example of the Krasnodar Region". Horticulture and viticulture, n.º 6 (20 de diciembre de 2019): 42–49. http://dx.doi.org/10.31676/0235-2591-2019-6-42-49.

Texto completo
Resumen
The role of digital technologies in the management of production and technological processes in fruit growing on the example of the protection of fruit plantations and yield is revealed. On the example of the Krasnodar Region, basic elements of a process control model for protecting fruit planting from a specifi c disease or pest are proposed for the elaboration of digital technologies: a theoretical basis that reveals the organizational and functional structure of the control of protection processes; structural analysis of components of the protection process control model and optimization of the parameters of plant protection systems to ensure high biological and technological-economic effi ciency; design algorithm for the protection process management model, development of methods and cost optimization for protective measures according to the criteria of biological and environmental and economic effi ciency. The algorithm of the organizational structure of the management methodology, which is the basis for the development of digital technologies for managing production processes in commercial fruit growing is presented, the functional content of the stages of the algorithm is considered. An algorithm is proposed for the development of digital technology for process control, including: the formation of multifunctional databases and data banks, as well as an empirical database and geocoded data collection; diagnosis of diseases and pests; development of plant protection systems; selection of the optimal protection system; development of regulations for the use of chemical and biological agents; assessment of the biological and environmental and economic eff ectiveness of plant protection systems and yield; substantiation of the optimal parameters of the plant protection system and the yield. A predictive assessment of the eff ectiveness of the use of digital technologies in managing the protection of fruit plantations against diseases and pests is given: a comprehensive digitalization of the plantation protection processes, according to empirical data obtained through the use of individual digital technology elements in agricultural organizations of the Krasnodar Region, North Caucasian Federal Scientifi c Center of Horticulture, Viticulture, Wine-making, data of the Ministry of Agriculture of Russia. This will allow reducing labor costs by collection, processing of information to justify the optimal solution on the application of system for protecting plantings and yield from pests and diseases, on average, 2 times as compared with traditional systems, comprehensive accounting of all factors that infl uence or determine the state of the system, 2 times higher labor productivity, cost savings on protective measures by 23 % on average, increased production effi ciency and the competitiveness of fruit products.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Zaveri, Parul. "Digital disaster management in libraries in India". Library Hi Tech 33, n.º 2 (15 de junio de 2015): 230–44. http://dx.doi.org/10.1108/lht-09-2014-0090.

Texto completo
Resumen
Purpose – Disaster management is an issue that has received relatively little attention in libraries, particularly in India. With the growth in digital resources in libraries, it is necessary for librarians to understand and apply the ways of protecting digital data and the related equipment from disaster. The purpose of this paper is to address the issues related to digital data protection in libraries in India. It aims to investigate the perceptions of librarians about the probability of digital disasters happening in their libraries, and to assess the level of digital disaster preparedness among libraries. Design/methodology/approach – A questionnaire based survey of 276 libraries in the Western region of India was conducted to find out the digital data protection measures taken by them. The paper provides an overview and analysis of the general trends in digital data protection in these libraries. Findings – The research results indicate that due to lack of knowledge about handling of digital data, and inadequate digital infrastructure setup in organizations, the chances of loss of digital data are high. However, common measures like taking backup of data manually are mostly followed by all libraries. The paper has identified the trends in protection of digital data, as well as the lacunae, in Indian libraries. Basic guidelines on digital data preservation are also presented in the paper. Practical implications – The guidelines provided in the paper will be useful to any libraries to take measures for protection of the digital data. The libraries will be able to prepare their digital data protection plan and train the staff accordingly. Originality/value – This paper is the first to address the issue of digital disaster management in libraries in India. It provides a detailed analysis of digital data protection measures taken by Indian libraries currently.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Agibalova, Elena, Igor Ilovaysky, Yanina Kayl y Viktoria Usanova. "Consumer protection in the digital environment". SHS Web of Conferences 109 (2021): 01002. http://dx.doi.org/10.1051/shsconf/202110901002.

Texto completo
Resumen
The study examines the positive and negative aspects of the spread of digital technologies on legal relations with the participation of consumers. The relevance of the research is due to the complexity of the online environment, in which consumers are vulnerable to risks and challenges that affect their ability to participate in digital transformation. The categories of persons most vulnerable in the digital age are considered; factors contributing to this process; possible counteraction measures by the competent authorities. The purpose of studying these issues is to determine the basis of legal regulation of relations arising in connection with the digitalization of the economy, as well as to justify the improvement of domestic legislation in this area. The main research method was a systematic analysis of the categories “digital environment” and “consumer rights”, as well as a general scientific dialectical method, specific scientific and empirical methods of cognition. The study confirmed the hypothesis that consumers of digital goods (services) are less protected than consumers of traditional goods (services), however, the authors conclude that it is necessary to equally protect the rights of consumers of all social groups, while establishing special protection measures for the most vulnerable of them.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Osintsev, Anatoly A., Aleksandra I. Naumova y Elena I. Gracheva. "Analysis of distance protection’s operation in cases of deep saturation of current transformers". E3S Web of Conferences 288 (2021): 01095. http://dx.doi.org/10.1051/e3sconf/202128801095.

Texto completo
Resumen
There is usually no information about permissible error of current transformers in modes succeed by large relative short-circuit current, at which microprocessor-based protections operate stably. By this reason, it is necessary to use data, defined for analog relays. It leads to value appreciation of a project because it is often essential to reduce current transformers’ error in case of a short circuit fault. Therefore, it is necessary to define the value of current transformers’ error, permitted for impedance relays. Conclusions of fundamental and applied sciences (mathematical analysis, theoretical foundations of electrical engineering, theory of simulation), analytical methods of researching nonlinear circuits and digital signal processing were used. A simulation model was created for setting overall tests of the current trans-former (CT) system. It was a relay protection device that reflected all the important properties of studied objects and allowed an analysis of digital distance protection’s operation at high levels of short-circuit currents. The factors influ-encing over digital distance protection’s operation in case of deep saturation of CTs were revealed, and a certain algorithm for definition of the permissible CT errors was proposed. Stable operation of digital distance protection was observed in case of a fault nearby the place of current transformers’ setting in all theoretically possible combinations of electrical system’s power and length of a protected electric power transmission line. It is valid if electric load choice is carried with account for stable protection’s operation in condition of a fault in the computational point and if voltage swell in secondary wirings is infeasible.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

محمود, محمود. ""الحماية المدنية لحق المؤلف في اطار البيئة الرقمية "دراسة تحليلية في القانون العراقي". Al-Kitab Journal for Human Sciences 1, n.º 2 (4 de octubre de 2020): 213–33. http://dx.doi.org/10.32441/kjhs.01.02.p17.

Texto completo
Resumen
The extensive technological developments have imposed a new reality to be dealt with particularly in the fields of modern communications, like the Internet. According and encounter then legally rights of individuals have been in fringed more particularly, the right of authors in the Framework of the Digital Environment. As it is known that electronic publishing has achieved many advantages as the easiness in publishing and the fast spread around the world decreasing of the value of publishing costs when compared with the traditional publishing. In spite of that, the electronic publishing has contributed to decreasing the legal protection granted for the authors in the framework digital environment due to the emergence of technical measures that nullify all the means of protecting author’s literature. For this reason, it is necessary to make a study concerned with evaluating the civil protection for the published literature in the framework of the digital environment, in the law of protection the right of Iraqi author through an analytical study which aims at investigating: the effectiveness of the machinery taken in order to protect the right of the Iraqi authors by dealing with the protection, on the one hand, and the civil means available to protect the published literature in the digital environment, on the other.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Egorova, M. A., O. V. Kozhevina y A. Yu Kinev. "Legal Protection of Competition in the Emerging Digital Markets". Lex Russica 74, n.º 2 (25 de febrero de 2021): 40–49. http://dx.doi.org/10.17803/1729-5920.2021.171.2.040-049.

Texto completo
Resumen
At a new stage in the development of digitalization, the main challenge is the expotential growth of quantity, quality, diversity of links between citizens, organizations, development institutions and legal regulation, public authorities. Interrelations are dynamic and unstable due to a number of factors because of insufficient synchronization between all elements of socio-economic systems and institutions.The paper examines topical issues of competition law in terms of legal regulation of digital markets. The authors provide for the legal interpretation of the digital market. Key aspects of legal regulation of digital markets are defined. The authors propose instruments of legal regulation of emerging digital markets for the Russian Federation. Their proposals are based on generalization of European experience and practice of the OECD countries.The authors substantiate that widespread digitalization threatens to monopolize economic relations. And this is monopolization of a new, not classical character. Therefore, it is important to identify properly the forms and methods of legal protection of competition in specific digital markets.Based on the results of the study, the authors conclude that the development of the digital economy and the formation of new market relations establish prerequisites for the improvement of antimonopoly regulation, legal rules unification for the protection of competition in global digital markets. Digital markets differ from traditional ones. Therefore, they need special legal regulation. The practice of antimonopoly regulation in the OECD countries should be considered in the context of their consistency with Russian legislative conditions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Lee, Nam-Yong, Jinhong Yang y Chul-Soo Kim. "Blockchain-Based Smart Propertization of Digital Content for Intellectual Rights Protection". Electronics 10, n.º 12 (9 de junio de 2021): 1387. http://dx.doi.org/10.3390/electronics10121387.

Texto completo
Resumen
Several platform companies have been successful in competing with digital piracy by producing consumer-friendly services. Nowadays, however, the digital content service market has become more monopolized than ever, which forms barriers to the entry of new platform companies. The platform monopoly would cause considerable problems both to content providers and consumers as it limits the choice of consumers. To remove the platform monopoly in digital content markets, we propose a public blockchain-based digital content service method. The proposed method encrypts the digital content to a self-decryptable form, which we call Smart Propertized Digital Content (SPDC), and utilizes the decentralization and traceability of the public blockchain to provide a non-monopolistic ecosystem for the management and distribution of the SPDC license. The proposed method can be more beneficial both to content creators and users than the current winner-takes-all platform model. For instance, users can download SPDC once and play many times without requesting the decryption key, and SPDC owners can make SPDC licenses to be time-limited, device-limited, resellable, or terminated without resorting to help from other intermediaries. We conducted the threat analysis on the proposed method by examining possible attacks in various scenarios. Based on threat analysis, we conclude that the proposed method can provide a new type of digital content service ecosystem that can be operated in a completely decentralized way and neutrally beneficial to all participants.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

(CIPIT), Centre for Intellectual Property and Information Technology. "Privacy and Data Protection Practices of Digital Lending Apps in Kenya". Journal of Intellectual Property and Information Technology Law (JIPIT) 1, n.º 1 (4 de junio de 2021): 131–69. http://dx.doi.org/10.52907/jipit.v1i1.68.

Texto completo
Resumen
The Centre for Intellectual Property and Information Technology Law (CIPIT) has been studying the impact of digital identities on society. This has included policy research on the legal and technical aspects of the national digital ID system Huduma Namba under which the Government is integrating all its identification documents. This research shows that the national digital identity system also integrates with privately issued digital identities such as mobile phone numbers and social media accounts. We anticipate that as national digital ID uses increase, so will the linkage with private systems. This is already evident from e-government services, where payments for Government services, such as passport applications, drivers’ licences, national health insurance and hospital bills in public hospitals are made using mobile money platforms. We also appreciate that private digital ID is more developed and has more uses than national digital ID. For example, a 2019 survey, undertaken by the Central Bank of Kenya (CBK), estimates that access to financial products had risen from 26.7% in 2006 to 89% of the population in 2019. This is attributed partly to the availability of digital products such as “mobile banking, agency banking, digital finance and mobile apps”. These products make use of personal data, which broadly falls under digital identities. This study seeks to understand the privacy implications of digital ID by looking at digital lending apps.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Macedo, Alexandre Cordeiro. "Some thoughts about the Intersection between Data Protection and Competition Law: A View from Brazil". Journal of Antitrust Enforcement 9, n.º 2 (1 de julio de 2021): 197–202. http://dx.doi.org/10.1093/jaenfo/jnab007.

Texto completo
Resumen
Abstract This article presents some thoughts about the relationship between Data Protection and Competition Law—focusing on the implementation of the New Brazilian Data Protection Law (LGPD). The Digital Era, the Digital Economy, and the Data-Driven Market (although they present different definitions, they are all concepts that have a strong connection between their meanings) are significantly changing a variety of aspects in our lives. In terms of legal consequences, the Digital Era has created a new, unique and specialized field (Data Protection). Although Data Protection is affecting Competition Law, as well as other fields of law, it is always important to have in mind its purposes and goals in order to not merge what should not be merged.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Volkova, K. M. "CONDUCTING A SYNTHESIS OF A DIGITAL AUTOMATON FOR AN AUTOMATED FIREFIGHTING SYSTEM". Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 21, n.º 1 (febrero de 2021): 49–58. http://dx.doi.org/10.14529/ctcr210105.

Texto completo
Resumen
Every year the industry in the world is gaining momentum: the number of industrial enterprises is growing, and with it the number of accidents at them. Oil today is the most common product for the synthesis and production of products. Increasing the level of fire protection systems at oil refine¬ries remains one of the most important components of protecting people from technogenic hazards. The speed of innovation allows the application of artificial intelligence in the creation of automated fire protection systems. Research objective. This study is aimed at building a model of an automated integrated fire protection system (AISPPO).Through the synthesis of digital automata and minimizing the control functions of the digital model is created a system of automated integrated fire protection system. Materials and methods. To solve the problems of research used methods of constructing graphical algorithms of automated integrated fire protection system. This system is a new approach to solving the issue of safety of industrial facilities in the oil refining industry. Results. The proposed new model of the software implementation of a digital automaton in an automated integrated system of fire detection and monitoring of an oil refinery has made it possible to create a bank of calculated and analytical data on all potential types of failures in the structure of the enterprise in order to train personnel and make changes to existing methodological documents and instructions for personnel actions in a particular situation. Conclusion. The developed technology allows you to process the incoming signal contained in cyclograms into an intermediate form for the synthesis of digital automata using innovative tools.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Beduschi, Ana. "Digital identity: Contemporary challenges for data protection, privacy and non-discrimination rights". Big Data & Society 6, n.º 2 (13 de junio de 2019): 205395171985509. http://dx.doi.org/10.1177/2053951719855091.

Texto completo
Resumen
The World Bank estimates that over one billion people currently lack official identity documents. To tackle this crucial issue, the United Nations included the aim to provide legal identity for all by 2030 among the Sustainable Development Goals. Technology can be a powerful tool to reach this target. In the digital age, new technologies increasingly mediate identity verification and identification of individuals. Currently, State-led and public–private initiatives use technology to provide official identification, to control and secure external borders, and to distribute humanitarian aid to populations in need. All of these initiatives have profound implications for the protection of human rights of those affected by them. Digital identity technologies may render individuals without legal documentation more visible and therefore less vulnerable to abuse and exploitation. However, they also present risks for the protection of individuals' human rights. As they build on personal data for identification and identity verification, data protection and privacy rights are most clearly affected. The prohibition of discrimination in the digital space is also of concern as these technological advances' societal impact is not yet fully understood. Accordingly, the article argues that emerging digital identity platforms will only contribute to the protection of human rights if the providers adequately mitigate any risks of potential discrimination and promote high standards of privacy and data protection.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Lin, Hui, Pei Liu, Wei Li, Lian Peng Zhang y Ya Zhou Ji. "Construction of Digital Mine and Key Technologies". Advanced Materials Research 524-527 (mayo de 2012): 413–20. http://dx.doi.org/10.4028/www.scientific.net/amr.524-527.413.

Texto completo
Resumen
In China, the mine is facing a stern challenge over its environmental protection, the limitation on its structure and function within its subsystem, optimization of its limited manpower, financial and material resources and its sustainable development. Digital mine is come up with to deal with all these problems. The Digital Mine can be liken to “a logistics supply chain”, the basic characteristic is the high-speed network, with broadband and two-way communication system, used as “path map”, which shall make sure the fast delivery of all the data within all the relevant enterprises in the country; It consists of vehicles, which refers to the techniques of Mine CAD, virtual reality, mine simulation, scientific calculation, artificial intelligence, visualization and office automation; goods, which refers to mine data and mind application model; package, which refers to 3DGM(3-Dimensional Geographical Model) and data mining; security system, which refers to the collection and renewal system of mine data; and dispatching system, which refers to MGIS(Mine Geographical Information System), the common carrier of the entire information and office decisions, controlling the use and operation of all vehicles as well as all of the goods production and the package system. The basic structure of the Digital Mine is composed of two parts: digital ground and digital mine. The digital ground is a management information system based on the EPR (Enterprise Resource Planning) and spatial information infrastructure and information system based on 3S technology and computer network. The digital mine regards the mine geology and surveying data as basic information data for spatial positioning, furthermore, inputting other relevant information if necessary, such as mining working-face, excavating working-face, underground chamber, mechanical and electronic equipments, ventilation and safety device, underground pipeline and communication and others, forming a spatial database. Thus, the entire mine’s information system of management and service and decision support system is established. The Digital Mine is a huge systematic project, involving 3S (GIS, GPS, RS), IT (Information technology), mine science, virtual reality technology and visualization technology. Based on computers and network communication, the Digital Mine realizes the digitization of storing, transporting, expressing and applying of all the relevant spatial data and attribute data, including mine construction, exploration, development, mining, environmental protection and control. In addition, it is also a huge artificial intellectual system that integrates digital construction, digital exploration, digital mining, digital environmental protection and digital forecasting based on data dictionary technology, data warehouse technology, WebGIS, virtual reality technology, multimedia technology, CASE technology and artificial intelligence technology.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Ismagilova, Olga y Karine Khadzhi. "Global Experience in Regulating Data Protection, Transfer and Storage". Economic Policy 15, n.º 3 (junio de 2020): 152–75. http://dx.doi.org/10.18288/1994-5124-2020-3-152-175.

Texto completo
Resumen
Cross-border data flows management and privacy protection are placed high in the international digital agenda due to unprecedented growth in the volume and pace of data collection, processing, storage and transfer globally. Despite the high importance of data flows regulation and its serious influence on all enterprises involved in digital economy, there is little research conducted in Russia and systemizing the national strategies in this sphere of regulation. The article provides an overview of the existing approaches of different countries to data protection, transfer (cross-border included) and storage, analyses the impact of regulation on international trade flows, and develops proposals for possible measures to reduce costs for companies in the digital age. The research discovers that today most countries of the world regulate personal data and other categories of sensitive data flows through the introduction of either a separate law or data protection provisions in the relevant sectoral laws. The countries’ approaches range from a complete ban on the cross-border transfer of all or certain categories of data to foreign countries to complete liberalization in this area. The most common approach is the introduction of one or several restrictions from the set of measures related to cross-border data transfers: data localization requirement; limitations on the number or type of countries to which sensitive data can be transferred without additional requirements; and the requirement of the personal data subject’s consent or responsible public authorities’ permission.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Ziccardi, Giovanni. "Wearable Technologies and Smart Clothes in the Fashion Business: Some Issues Concerning Cybersecurity and Data Protection". Laws 9, n.º 2 (29 de mayo de 2020): 12. http://dx.doi.org/10.3390/laws9020012.

Texto completo
Resumen
Wearable devices and smart clothes give rise to pivotal technological and legal issues in the fashion business. The cybersecurity attention in the digital society, and the advent of General Data Protection Regulation No. 2016/679 (GDPR) in the European, and global, legal framework, implied the need to evaluate which norms and aspects of the European Regulation could apply to wearable devices, which are becoming more and more invasive. Wearable devices are, first of all (and from a data protection point of view), intrusive tools that can put users’ personal (and intimate) data at risk. In particular, we will discuss the aspects of the spread of an accountability “culture” (also) in the fashion business, the need for correct management policy of data breaches, the rights of transparency for users/customers who are using wearable devices and smart clothes, and respect for the dignity and nondiscrimination of the individual during the data collection and processing. These are, all, fundamental points: the protection of the individual’s data in the digital landscape is, in fact, strictly connected to the protection of his/her fundamental rights in the modern digital society.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Jaroszek, Agata. "European Online Marketplace – New Measures for Consumer Protection against “Old Conflict of Laws Rules”". Masaryk University Journal of Law and Technology 9, n.º 1 (30 de junio de 2015): 21–41. http://dx.doi.org/10.5817/mujlt2015-1-3.

Texto completo
Resumen
The paper aims at discussing the rationale for protecting consumers under the new directive on consumer rights (CRD) and its relation to conflict of law rules under the Regulation on the law applicable to contractual obligations (Rome I).The author is of the opinion the newly adopted legal framework for consumer protection under the directive on consumer rights seems to be more predictable especially in terms of supporting consumers with more mandatory information before the conclusion of a contract with a professional as well as a single 14 day withdrawal period for all Member States. However, the level of consumer protection in the purchase of digital content is insufficient and from the perspective of conflict of laws rules for consumer contracts under Rome I, a consumer who actively makes a purchase from a professional from another Member State or a third country cannot expect the special protective rules envisaged in the regime under CRD and Rome I to be applied by default; rather, the general rules come into play.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Andreev, Mikhail, Aleksey Suvorov y Vladimir Rudnik. "Identification of measuring part elements of numerical relay protection by its response time". Proceedings of Irkutsk State Technical University 24, n.º 5 (octubre de 2020): 1030–40. http://dx.doi.org/10.21285/1814-3520-2020-5-1030-1040.

Texto completo
Resumen
The purpose of the study is to develop an identification method of a specific implementation of the elements of the measuring part (intermediate converters, analog filters) and partially computational-logical part (digital filters) of a microprocessor relay protection by the signal actuation time, which, unlike the existing approaches allows to identify and exclude the delays introduced by the executive protection elements. The method of directed graphs is used to form a mathematical model of the measuring part of the microprocessor relay protection. The solution formed as a result of differential equations is implemented using the method of analog implicit continuous integration. The time delays introduced by the input protection circuits are determined as follows: identical signals are fed to the terminal and the mathematical model of protection; signal actuation time is recorded, where the time starting point is the moment the input signal reaches the setpoint and the end point is the moment of the actuation signal occurrence. Having studied 144 different combinations of measuring part elements (intermediate converters, analog filters) and digital filters with a finite impulse response of microprocessor relay protection, the most “optimal” combination has been chosen, which features the least deviation from the response time of a real device in all studied modes as compared with other combinations. The proposed identification method of input circuit elements of microprocessor (numerical) protection is the main way to bring the model closer to a real device. It also enables to receive a table of “typical” response times of protections with the different structure of the measuring part and depending on the specific type of protection terminal choose in practice a predetermined “optimal” internal composition of protection used when setting up protection using their mathematical models.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Bernard Akindade Adaramola y Daniel Danjuma Chirpyen. "Experimental investigation of insulation resistance for turbo generator digital protection". Global Journal of Engineering and Technology Advances 5, n.º 2 (30 de noviembre de 2020): 030–37. http://dx.doi.org/10.30574/gjeta.2020.5.2.0096.

Texto completo
Resumen
Insulation of all electrical machinery is practically in the form of organic compounds that contain water as part of their make-up. Excessive temperature tends to dehydrate and oxidize the insulation and make it become brittle and disintegrate under vibration and shock. The insulation lifespan of turbo generators deteriorates slowly at low temperatures and more rapidly at high temperature. Economic factors, such as initial cost, replacement cost, obsolescence, and maintenance, are of prime importance when determining the years of useful service desired for the electrical insulation. Generator digital protection- fault diagnosis test was carried out to find out the cause of insulation breakdown on the turbo generator unit 411G3. The experimental procedure consists of an insulation resistance test, meggering (time-resistance absorption test), and pendulum over-speed test. A thorough investigation was conducted to identify all the stator bars that constituted the Red phase and other connections. Voltage drops on these stator bars were measured and values were used to detect ground faults which were rectified via an intelligent protection scheme.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Corne, Thania Christy. "LEGAL PROTECTION OF PRIVACY DATA THROUGH ENCRYPTION TECHNOLOGY". Lampung Journal of International Law 1, n.º 2 (13 de agosto de 2020): 61. http://dx.doi.org/10.25041/lajil.v1i2.2027.

Texto completo
Resumen
Technological developments in the era of globalization bring humans into the digital age. All things will directly contact with an electronic system. And so with the data, some of the data among this world is privacy. That’s why encryption is needed to be applied. Initially, encryption was used as a privacy data protector, but in its development encryption gave birth to problems in the legal field. Where criminals use encryption as a shield for their crimes. Therefore, legal issues arise, whether for reasons of government or state security can have access to one’s privacy data. How does international or national law regulate the issue of using decryption of encryption technology? The method used in this paper is a juridical-normative comparative legal research method. The result shows that international law does not regulate the use of encryption in protecting privacy data in the digital world comprehensively because some of the countries claim that the use of encryption is a part of human right, on the other hands some country has another vision on national security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Melman, Anna, Oleg Evsutin y Alexander Shelupanov. "An Authorship Protection Technology for Electronic Documents Based on Image Watermarking". Technologies 8, n.º 4 (20 de diciembre de 2020): 79. http://dx.doi.org/10.3390/technologies8040079.

Texto completo
Resumen
In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology. One of the urgent tasks is the protection of electronic documents during their transfer in information systems, including smart systems. This paper proposes a technology for protecting electronic documents containing digital images. The main idea is that the electronic document authorship can be protected by embedding digital watermarks in the images that are contained in this document. The paper considers three cases of using the proposed technology: full copying of an electronic document, copying of images contained in the document, and copying of text. It is shown that in all three cases, the authorship confirmation can be successfully implemented. Some areas of the proposed technology application are described, including augmented reality applications. Computational experiments are conducted with robust watermarking algorithms that can be used within the technology. A scenario of technology implementation is proposed which provides for the joint use of different class algorithms.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Ibiricu, Bernice y Marja Leena van der Made. "Ethics by design: a code of ethics for the digital age". Records Management Journal 30, n.º 3 (10 de junio de 2020): 395–414. http://dx.doi.org/10.1108/rmj-08-2019-0044.

Texto completo
Resumen
Purpose This paper aims to provide a framework for a code of ethics related to digital and leading edge technologies. Design/methodology/approach The proposed ethical framework is anchored in data protection legislation, and results from a combination of case studies, observed user behaviour and decision-making processes. Findings A concise and user-friendly ethical framework ensures the embedded code of conduct is respected and observed by all employees concerned. Originality/value An ethical framework aligned with EU data protection legislation is required.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Doletskaya, Larisa I., Vladislav I. Ziryukin y Roman V. Solopov. "An electric power system object model creating experience for researching the operation of digital means of relay protection and automation". Journal Of Applied Informatics 16, n.º 4 (31 de agosto de 2021): 83–95. http://dx.doi.org/10.37791/2687-0649-2021-16-4-83-95.

Texto completo
Resumen
The article is devoted to the operation logic modeling of relay protection and automation terminals in order to their verification, adjustment and further exploitation. The problem of adjusting protection terminals mutual interaction is unlikely to appear in real conditions due to wide variety of them. The authors propose a solution to this problem by creating a verified model based on a digital twin of an electric power network section created in the MatLab software package. This model helps to study the functioning of the researched protection settings in nominal, repair, emergency and post-emergency equipment operation modes. A model of the selected substation was created displaying all the properties that are significant for research of the original one. In addition, the requirements analysis for the main and backup protection operation settings of the three-winding transformers was carried out. The main unit is a differential transformer relay protection and the backup one is maximal current protection in amount of three units for every transformer winding circuit: higher, middle and lower transformer voltage branch. The model makes it possible to analyze the relay protection operation selectivity by checking the current settings which could be imported from XML documents unloaded from existing terminals and to evaluate the correctness of new calculated ones with the possibility of their manual input. As a result of the researched object modeling, a three-stage operation analysis of the differential and maximal current protections was carried out. It has shown relay protection selective operation both in the case of nominal and abnormal modes, including the event of the main transformer protection malfunction. This technique can be extended to the other electric power network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Sullivan, Clare. "Digital Citizenship and the Right to Identity in Australia". Federal Law Review 41, n.º 3 (septiembre de 2013): 557–84. http://dx.doi.org/10.22145/flr.41.3.7.

Texto completo
Resumen
Australia has announced the need to review the distribution of responsibility among individuals, businesses and governments, as a consequence of the move to digital citizenship. Australia has formally framed the issues in these terms and has opened dialogue between government and citizens regarding responsibilities for the use and protection of digital identity. This article examines digital citizenship in Australia and considers the implications for individuals, government and the private sector of the requirement for an individual to use his/her digital identity for transactions. The features and functions of digital identity are examined, and the consequences for individuals, business and government of system failure are considered. The analysis shows that, while there are consequences for all, individuals are most affected. The author argues that the traditional approach of relying on privacy for protection is inadequate in these circumstances. Privacy, by its nature, cannot adequately protect the part of digital identity which is required for transactions. The argument presented is that, unlike privacy, the right to identity can protect the set of digital information required for transactions. Considering the new system is literally being imposed by government, the inherent vulnerabilities of the system, and the consequences of system failure for individuals, formal recognition of the right to identity is an essential element of accountable and responsible governance. Whilst in time the right to identity in this context may be recognised by the courts, the author argues that legislative recognition and protection of an individual's right to digital identity is needed now as a key component of the distribution of responsibility in this new digital era.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Kodynets, Anatolii y Arsen Murashko. "Video game in the system of intellectual property: the concept and features of legal protection". Theory and Practice of Intellectual Property, n.º 3 (7 de septiembre de 2021): 57–66. http://dx.doi.org/10.33731/32021.239584.

Texto completo
Resumen
Keywords: video game, intellectual property law, computer program, software, digitalinformation, electronic information, multimedia work, audiovisual work The article is devoted to thestudy of the legal understanding of video games as an object of intellectual propertyrights. The author concludes that video games constitute digital information, whichgreatly facilitates their development, however, complicates the protection of intellectualproperty rights. There is a contradictory connection between the concepts of«electronic (digital) information», «audiovisual work», «computer program» and «literarywork», which establishes some uncertainty in the protection of video games,namely, what should be understood by these concepts in terms of law.The author found that the use of the latest technologies to improve the visual componentbrings the video game even closer to the game audiovisual object, which increasesthe complexity of the process of protection of intellectual property rights. However, thecurrent situation with the use of the term «computer program» in the context of protectionof intellectual property rights to video games does not cover all features of the latter,covering only the main program among the software recording and operation of thegame, such as audiovisual content. Therefore, there is a need to use the generalized conceptof «software» as opposed to the narrower concept of «computer program». In thiscase, in the absence of at least one of the characteristics of the multimedia work, the computerprogram should be referred to the scope of legal regulation of software.The author proposed to understand the video game as object of intellectual propertylaw in the following manner: multimedia work expressed in the form of digital(electronic) information, the principle of which is determined by the algorithms of thesoftware provided for installation in the memory of computer devices.In general, the digital nature of video games presupposes a revision of existing approachesto the protection of intellectual property rights, which may be aimed atweakening the regulatory function of the law where it is possible to regulate the relationshipby more flexible means.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Vybornova, Yuliya y Vladislav Sergeev. "Method for Protection of Copyright on Vector Data". Informatics and Automation 20, n.º 1 (20 de enero de 2021): 181–212. http://dx.doi.org/10.15622/ia.2021.20.1.7.

Texto completo
Resumen
The paper proposes a method of copyright protection for vector maps, based on the embedding of raster digital watermarks. The method combines original ideas, namely, a vector data watermarking approach that does not distort the coordinate information of vector objects and embedding of noise-like images that encode a binary sequence. The use of noise-like carrier allows to simplify the verification procedure, and also to ensure the resistance of the hidden bit sequence to distortions, including interpolation errors. In comparison with previous investigations made by the authors when solving problems of vector data protection, the robustness of the embedded noise-like digital watermarks has been significantly increased by developing a new algorithm for detection of the binary sequence hidden in the spectrum of a noise-like image. The purpose of the experimental studies was to assess the attainable probability of correct sequence extraction for various parameters and embedding conditions. The study of information capacity showed that the potential amount of information embedded in each polygon without distorting the watermark sequence depends on the type of a map, namely on the number of vertices that make up each polygon. An experimental study on robustness against potentially possible transformations aimed at maliciously deleting the digital watermark from the vector map is performed. The developed method demonstrates resistance to affine transformations, cropping, addition, removal and reordering of vertices / objects, and, thus, seems to be the optimal solution to the problem of copyright protection for vector data. The analysis of the method quality according to the criteria of accuracy, durability, information capacity, and computational complexity is performed. The results of all conducted studies confirm the efficiency and the effectiveness of the proposed method for vector map protection, as well as its distinct advantage over the prior art.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Yushchenko, Natalya, Rustem Magizov y Elmira Gumerova. "3D Printing as an Object of Legal Protection". SHS Web of Conferences 93 (2021): 02019. http://dx.doi.org/10.1051/shsconf/20219302019.

Texto completo
Resumen
The article discusses the formation of a new approach to the statutory regulation of 3D printing, an uncommon object of civil matters. Creating a product with the help of such technology not only by an entrepreneur but also by any person, can in practice cause some issues in protecting all participants’ rights during the 3D printing process. 3D printing is regarded as a complex object, so its characteristics are determined. Additionally, possible ways of resolving legislative gaps are proposed, such as: defining the concept of the manufacturer, supplier, seller, and consumer of 3D printed products; developing their rights and responsibilities; establishing quality requirements for 3D printed elements; and adopting clear rules on liability and consumer protection. Due to the widespread use of digital technologies, Russian legislation requires a thorough reconsideration and early reform.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Romaniuk, F. A., Yu V. Rumiantsev, V. Yu Rumiantsev y I. V. Novash. "Improvement of Algorithm for Formation of Orthogonal Components of Input Quantities in Microprocessor Protection". ENERGETIKA. Proceedings of CIS higher education institutions and power engineering associations 64, n.º 2 (9 de abril de 2021): 95–108. http://dx.doi.org/10.21122/1029-7448-2021-64-2-95-108.

Texto completo
Resumen
The use of orthogonal components (OC) underlies the construction of measuring elements of modern protection and automation devices. In most microprocessor-based protections, the orthogonal component of the input signal is extracted using a discrete Fourier transform (DFT). The DFT disadvantages are its low speed, which is more than one period of the fundamental frequency, as well as the sensitivity to the free aperiodic component, which creates significant conversion errors depending on the time constant of its decay. Such a settling time of the true output signal is often unacceptable for the design of high-speed measuring devices. The paper proposes to form the OC of the equivalent signal according to the values of the cosine and sine OC of the fundamental harmonic, formed using the DFT by multiplying them by the resulting correction factor. The developed algorithm for the formation of orthogonal components of input signals in microprocessor protections is characterized by high speed in transient modes and it has wide functionality. So, the proposed digital device for forming the orthogonal components of an equivalent signal, in comparison with digital filter based on the DFT, has an increased operating speed both in the mode of occurrence of a short circuit and during the decay of the monitored signal, while maintaining the same characteristics as in the DFT in other modes. A block diagram of the proposed digital device for forming the OC of an equivalent signal has been developed, all blocks of which can be implemented on a microelectronic and microprocessor element base. A digital model of the specified device has been developed in the dynamic modeling system MatLab-Simulink in accordance with the structural diagram. As a result of the calculations, a significant (up to two times) increase in the performance of the proposed digital device for forming the OC in transient modes has been established in comparison with the shapers based on the DFT.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

khan, Asif y Ximei Wu. "Impact of Digital Economy on Intellectual Property Law". Journal of Politics and Law 13, n.º 4 (13 de octubre de 2020): 117. http://dx.doi.org/10.5539/jpl.v13n4p117.

Texto completo
Resumen
Intellectual property is regarded to be the digital economy's hot issue. It ranges from theoretical arguments to own information concerning everyday life relating to the foundation of internet geography. The current study deals with the impact of the digital economy on intellectual property law and proposes that although various countries have given many intellectual property laws, no such implementation has ever been made. Still, the digital world has witnessed the protection of intellectual law through technical protection and contracts. The digital economy has greatly impacted the intellectual property law that can be witnessed through cyber squatter legislation and significant legal and economic protection developments. The endorsement of business methods patents and e-commerce would significantly affect freedom, computer as well as privacy. However, some of their personal information has been suggested by giving individual property rights while describing it to protect freedom and privacy. In this study, it has also been concluded that policy is critical to conceive and analyze issues so that it would be technology independent. It would help policymakers to draft legislation and policies in the same way. In addition to this, policymakers' decisions should not base on any business model's specifics only. Moreover, the study suggests the need for other adaptations to ensure that all the essential purposes in copyright laws, such as giving free access to the public for a broader range of information, have been adequately fulfilled in the digital economy context. However, such adaptations are yet to design, and for completing such tasks, the stakeholders' participation is significant.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Wisesa, I. Kadek Candra, Desak Gde Dwi Arini y Luh Putu Suryani. "Perlindungan Hukum terhadap Karya Cipta Fotografi". Jurnal Preferensi Hukum 1, n.º 1 (27 de julio de 2020): 33–38. http://dx.doi.org/10.22225/jph.1.1.2162.33-38.

Texto completo
Resumen
The richness in the diversity of arts and cultures can be found in the Republic of Indonesia. Intellectual property rights obtain protection as stipulated in legislation, including Law Number 28 of 2014 concerning Copyright. The advancement in technology and the increasingly developing world of digital photography by means of digital cameras raises the legal issues of copyright in photographic works. The main issues examined in this paper are: the forms of legal protection of the rights of the creators of photographic works and the resolution of disputes of photographic works that are used without permission. The method used to examine this issue is the normative legal research method with a legislative approach. Copyright Protection of photographic works may be done in two ways, namely preventive in which legal protection given to the creator of photography which the creator shall done by registering the copyright, and repressive protection realised by filing a lawsuit in court if there is a violation of copyright in the photographic work. All rights reserved must always be appreciated by not committing violating actions which are arbitrarily committed especially if it relates to providing benefits for violators.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Sujadmiko, Bayu, Intan Fitri Meutia, Didik Kurniawan y A. Negra Mardenitami. "The urgency of digital right management on personal data protection". International Journal of Research in Business and Social Science (2147- 4478) 10, n.º 1 (13 de febrero de 2021): 253–58. http://dx.doi.org/10.20525/ijrbs.v10i1.990.

Texto completo
Resumen
Today, the utilization of technology is not merely for the sake of entertainment, but also the exchange of information, trade, study, and governance. Followed by the increasing level of the technology application in various activities, not a few people become victims or perpetrators of a personal data breach in the cyber world. Thus, it is necessary to implement digital right management (DRM) by the manager of electronic systems, the Government and rights holders in the cyber world in computer systems. The Indonesian government has validated the rules that accommodate the protection of the personal data of each citizen in cyberspace, namely, Act number 14 of 2008 concerning Openness of Public Information, Act Number 19 of 2016 concerning Amendments to Act Number 11 of 2008 concerning Information and Electronic Transactions, Regulation of the Minister of Communication and Information Number 20 of 2016 concerning Protection of Personal Data in Electronic Systems and Presidential Regulation Number 39 of 2019 concerning One Data Indonesia. Based on these rules, all parties involved in the management, storage and exchange of personal data in Indonesia must have an integrated and trusted DRM mechanism.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Krainiuk, O., Yu Buts, V. Barbachin y N. Didenko. "PROSPECTS OF DIGITALIZATION IN THE FIELD OF OCCUPATIONAL HEALTH AND SAFETY". Municipal economy of cities 6, n.º 159 (27 de noviembre de 2020): 130–38. http://dx.doi.org/10.33042/2522-1809-2020-6-159-130-138.

Texto completo
Resumen
The modern world is impossible to imagine without digital technologies that are implemented in all areas of activity, including helping to address occupational safety. The purpose of this work was to consider the prospects and problems of implementation of information technology in the field of occupational safety, as well as ways to improve the use of digital technologies by health and safety professionals for more effective risk management and safety. Digitalization (digitalization) in labor protection is a transformation of OSH, which involves the use of digital technologies to optimize management, increase company productivity and improve working conditions and reduce the number of occupational diseases and accidents. The main procedures of digitalization, which are implemented in the field of labor protection, are highlighted. The main components of successful implementation of digital solutions in occupational safety are highlighted. The conditions for the introduction of digitalization in the management system of labor protection are formed. Various innovations, from process automation to the proliferation of field sensors and the transition to predictive analytics, will allow employees and organizations to make significant improvements in health and safety if they are able to take advantage of the opportunities that open up. In the coming years, there will be a shift from passive monitoring to specific recommendations that will give people software applications. Gadget data collected by gadgets will be used to assess occupational risk and occupational disease insurance. There are already examples of testing these technologies to increase productivity and reduce employee injuries. The considered technologies do not appear and are not used alone, the interconnected and complex, system approach is usually observed. Thus, all the tools listed in the introduction of digital technologies in the modernization of occupational safety management contribute to reducing the number of accidents.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Budimir, Vjekoslav y Eberhard Gröner. "Protection against falling rocks on roads in a mountainous area - Experiences from Switzerland". Put i saobraćaj 67, n.º 1 (22 de marzo de 2021): 43–46. http://dx.doi.org/10.31075/pis.67.01.06.

Texto completo
Resumen
Whether digital or real - mobility is a basic human need of everyday life in all segments. Therefore, the importance of roads and railways continues to gain in importance even in the age of digital highways. Many traffic routes have a century-old tradition. They are located in valleys and notches for overcoming mountains and mountain ranges. The design and maintenance of these traffic routes are particularly complex. An important part of this task is protection against stone impact in the mountains, but also in hilly areas. Even if there was no danger of rocks falling for decades or it was not known: due to climate change, the impact of water, the process of freezing and thawing and the growth of tree roots, there can be a significant risk.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Zheng, Y. "Digital Technology in the protection of cultural heritage Bao Fan Temple mural digital mapping survey". ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-5/W7 (13 de agosto de 2015): 495–501. http://dx.doi.org/10.5194/isprsarchives-xl-5-w7-495-2015.

Texto completo
Resumen
Peng Xi county, Sichuan province, the Bao Fan temple mural digitization survey mapping project: we use three-dimensional laserscanning, multi-baseline definition digital photography, multi-spectral digital image acquisition and other technologies for digital survey mapping. The purpose of this project is to use modern mathematical reconnaissance mapping means to obtain accurate mural shape, color, quality and other data. Combined with field investigation and laboratory analysis results, and based on a comprehensive survey and study, a comprehensive analysis of the historical Bao Fan Temple mural artistic and scientific value was conducted. A study of the mural’s many qualities (structural, material, technique, preservation environment, degradation, etc.) reveal all aspects of the information carried by the Bao Fan Temple mural. From multiple angles (archeology, architecture, surveying, conservation science and other disciplines) an assessment for the Bao Fan Temple mural provides basic data and recommendations for conservation of the mural. <br><br> In order to achieve the conservation of cultural relics in the Bao Fan Temple mural digitization survey mapping process, we try to apply the advantages of three-dimensional laser scanning equipment. For wall murals this means obtaining three-dimensional scale data from the scan of the building and through the analysis of these data to help determine the overall condition of the settlement as well as the deformation of the wall structure. Survey analysis provides an effective set of conclusions and suggestions for appropriate mural conservation. But before data collection, analysis and research need to first to select the appropriate scanning equipment, set the appropriate scanning accuracy and layout position of stations necessary to determine the scope of required data. We use the fine features of the three-dimensional laser scanning measuring arm to scan the mural surface deformation degradation to reflect the actual state of the mural surface patch model. For the degradation of the surface of the pigment layer, we use the patch model to simulate the scan obtained from an analysis. Statistics calculated relatively objective mural surface area from volume data, providing more accurate quantitative data for the mural conservation, especially, providing a viable technology for accurate monitoring of continued degradation. <br><br> We believe, in order to make use of the three-dimensional laser scanning technology in a digital heritage conservation application, the technology should not only be used to record the object geometry and play a role in record keeping aspects, but, rather, should be used during the investigation to protect against targeted degradation and a more meaningful interpretation function. Like the development of the medical application of X-ray technology not only retains a picture, but more importantly, through this technical interpretation of patient pathology, guides doctors in carrying out the treatment work. Therefore, in the process of digitization of cultural heritage research, the focus should shift to the use of digital technology in the analysis of heritage object degradation and degradation monitoring surveys can promote the application of digital technology in the conservation of cultural heritage.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Begishev, Ildar. "Semantic Analysis of the Term «Digital Security»". Legal Linguistics, n.º 20(31) (1 de julio de 2021): 24–38. http://dx.doi.org/10.14258/leglin(2021)2005.

Texto completo
Resumen
The article attempts at the semantic analysis of the term «digital security», revealing the scope of the meaning of this concept on the basis of theoretical and empirical research. The topicality of the problem is determined by the frequency, expansion of the use of the term «information security», which is associated with the phenomenon of the rapid development of digital technologies, and followed by systems to ensure the protection of digital information at all levels – state, corporate, personal. The research problem is connected with the insufficiently studied meaning of this term; therefore, the aim of the work was to identify the specific semantic field of the phrase «digital security». The tasks to be solved during the study are its distinction from semantically related phrases and concepts, clarification of the understanding of the term by representatives of target audiences. Due to the novelty of entering language lexicographic practice (dictionaries), this term has not yet been fully described, which is of interest not only from a scientific and substantive point of view (legal, informational, communication, multimedia, technological, etc.), but with semantic as well. Theoretical and empirical research methods were used in the work: in addition to a thorough analysis of open sources, a survey was conducted of more than a hundred respondents – representatives of target audiences using modern digital technologies and an interactive method of collecting information. The study allowed us to conclude that the semantic core of the concept of «digital security» consists of the following meanings: «security of information, digital data, personal information in a digital environment, digital information»; «protection, digital information security»; «Internet security»; «Confidentiality and integrity of information in digital form»; «Security when using digital technologies», «information security in digital networks, information systems», etc. Associations and connotations form the semantic periphery, such as «protection against hacks and hacker attacks»; «storage (security) of data on a personal device»; «cybersecurity»; «awareness of individuals and the population about certain safe ways of working with information», etc. The analysis also allowed us to conclude that the term (phrase) «digital security» is stable, it is synonymous in the minds of many carriers with combinations of the noun security with the adjectives information, computer, cyber, electronic, as well as the prospects for enhancing its further existence in the language.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Panchenko, Oleg y Irina Serdyuk. "Information state policy on the path of Digitization". Public administration aspects 8, n.º 1 SI (5 de julio de 2020): 107–9. http://dx.doi.org/10.15421/152053.

Texto completo
Resumen
In the era of turbulent development of information technology and constant information and psychological impact on the individual, society and the state, information legislation should be aimed at consolidating state information policy, ensuring a guaranteed level of national security in the information sphere, normal development of information technology and information protection, implementation digital technologies in all spheres of public life, prevention of development of information-destructive technologies of influence on society, protection of copyrights and related rights, etc.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Čelik, Petar. "Institutional Measures for Increasing the Cyber Security for Business in the European Union". Economic Themes 57, n.º 3 (1 de septiembre de 2019): 351–64. http://dx.doi.org/10.2478/ethemes-2019-0020.

Texto completo
Resumen
AbstractNumerous research and analytical studies envisage a new wave of disruptive innovations that will completely change the economic landscape, organization and business models in the short term, as well as ways of managing companies. This wave of innovation, followed by the use of new digital technologies, such as Big Data, mobile applications, social networking, robotics, 3D printing, nanotechnology, quantum informatics, cloud computing, etc., through various forms and modes of cyber vulnerability, contribute to reducing the ability to achieve effective protection, not only for companies and public services, but also for other services available to citizens. The current research preoccupation is focused on finding adequate solutions, in terms of protecting the digital economy and digital business from all modern threats and risks that the modern disruptive technologies carry along with. The thematic focus is on strengthening the institutional and operational capacities of existing and newly-formed specialized agencies, such as: ENISA, EC3 and EUROPOL, in order to provide an integrated institutional response to a wide range of hybrid and cyber threats. The final section of the paper presents an overview of comprehensive strategic, regulatory and institutional approach of the EU to cyber incidents and crises in the digital space.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Axworthy, Lloyd y A. Walter Dorn. "New Technology for Peace & Protection: Expanding the r2p Toolbox". Daedalus 145, n.º 4 (septiembre de 2016): 88–100. http://dx.doi.org/10.1162/daed_a_00414.

Texto completo
Resumen
New technological advances in areas such as digital information, algorithmic forensic data analysis, autonomous surveillance vehicles, advanced robotics, and multispectral sensors (sometimes all working together) can help avert war, introduce more effective peacekeeping and peacemaking initiatives, lessen the impact of conflict on innocent people, and help rebuild war-torn states. When international humanitarian action becomes urgent, by way of knowledge gained through such technologies, then those same peace applications can be used to reduce harmful forms of intervention and to ensure that enforcers are abiding by international law and UN guidance. An ethical failure occurs when such technologies exist to save lives, reduce risks, and secure peace, but are not employed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Lee, Hae Kook. "Prerequisites for stakeholder framework: Consumer advocacy and health protection in the digital industry. •". Journal of Behavioral Addictions 9, n.º 4 (15 de enero de 2021): 898–902. http://dx.doi.org/10.1556/2006.2020.00095.

Texto completo
Resumen
AbstractThe World Health Organization (WHO) included gaming disorders in International Classification of Disease-11th (ICD-11) on May 25, 2019. Since then, some academics and the gaming industry have continued to argue over the health system's response to online addictive behaviors. Under these circumstances, a framework involving groups representing various interests is needed to derive a reasonable solution to the dispute over the inclusion of gaming disorders in ICD-11. For this framework to work effectively, it is necessary to agree on consistent and advanced research findings that harms related to the excessive use of digital devices or content continue to occur empirically all over the world and that addictive use constitutes a primary addictive disorder. The problematic risk taking involving emerging technologies may include not only health risks from addictive use, but also more general harms associated with digital ethics and norms such as privacy and transparent money transactions. An understanding of a public health model of addiction is required to reduce harms associated with online addictive behavior that exist behind risk taking. Such harms are also mediated by excessive use, excessive money spending, and exposure to addictive content such as violence and pornography. Major stakeholders and their roles can be derived more effectively based on these conceptual models and parameters of harms. In conclusion, the context of the proposed stakeholder framework should be further optimized on the basis of two principles: (1) advocating consumer rights as a general and standard approach to digital products; and (2) protecting consumers' health from harms related to addictive behaviors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Lunev, Andrey. "Safe manufacturing: four directions of video technology development". Okhrana truda i tekhnika bezopasnosti na promyshlennykh predpriyatiyakh (Labor protection and safety procedure at the industrial enterprises), n.º 2 (26 de febrero de 2021): 13–16. http://dx.doi.org/10.33920/pro-4-2102-02.

Texto completo
Resumen
It is impossible to imagine a modern enterprise without technologies: they significantly simplify work, helping to optimize processes at all stages of production. However, often the main task of industrial digital solutions is to ensure the protection of the health of employees and the protection of wealth. In this case, video surveillance comes to the fore. Andrey Lunev, Head of Intelligent Video Surveillance at Mobotix Konica Minolta Business Solutions Russia, talks about how video technologies can be used in production and what security tasks they solve.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Yu, Xiaoyan, Chengyou Wang y Xiao Zhou. "A Survey on Robust Video Watermarking Algorithms for Copyright Protection". Applied Sciences 8, n.º 10 (11 de octubre de 2018): 1891. http://dx.doi.org/10.3390/app8101891.

Texto completo
Resumen
With the development and popularization of the Internet and the rise of various live broadcast platforms, digital videos have penetrated into all aspects of people’s life. At the same time, all kinds of pirated videos are also flooding the Internet, which seriously infringe the rights and interests of video copyright owners and hinder the healthy development of the video industry. Therefore, robust video watermarking algorithms for copyright protection have emerged as these times require. In this paper, we review robust video watermarking algorithms for copyright protection based on original videos and compressed videos. Basic models and properties of video watermarking algorithms are described, and the evaluation indexes corresponding to each property are also introduced. To help researchers understand various existing robust watermarking algorithms quickly, some basic information and the quantitative estimation of several performances are analyzed and compared. Finally, we discuss the challenges in the research of robust video watermarking algorithms, and give possible development directions for the future.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Purcaru, Anca, Dorina Mioara Purcaru y Ioan Mircea Gordan. "Data Acquisition and Processing Method Adequate for High Speed Transient Electrical Events". Applied Mechanics and Materials 772 (julio de 2015): 541–45. http://dx.doi.org/10.4028/www.scientific.net/amm.772.541.

Texto completo
Resumen
Many programmable electronic modules for data acquisition and processing can be found in power systems. To monitor and record different specific high speed transient events in energetic systems, an adequate data acquisition and processing method is required. This paper deals with such method and its application in data acquisition for implementation of complex protection functions. The acquisition routine for analog and digital channels, detailed acquisition and storing process for analog and digital values, storing and calculation method for acquired digital and analog values are all presented. The proposed method is adequate for many and various practical applications which require high speed data acquisition systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Sekhar, Savarapu Chandra, G. Ravi Kumar y S. V. N. L. Lalitha. "Renewable energy integrated multi-terminal transmission system using wavelet based protection scheme". International Journal of Power Electronics and Drive Systems (IJPEDS) 10, n.º 2 (1 de junio de 2019): 995. http://dx.doi.org/10.11591/ijpeds.v10.i2.pp995-1002.

Texto completo
Resumen
The power plants behavior is crucial under faulted conditions and responses on protection systems. Major microgrid (MG) protection problem is the problem between the fault current in utilitygrid mode and microgrid mode. As conventional protection system doesn’t offer solution for all MG protection challenge, but it needs advanced protection strategy. Protection system must response to both the utilitygrid and MG faults. Fast response of protection is necessary as early as possible if the fault is occurs on utilitygrid and if the fault is occurs on MG, the protection scheme must seperate the small possible portion of MG to remove the fault. This work presents a typical MG protection scheme using digital relaying and satellite communication with wavelet detailed D<sub>1</sub>-coefficients of mother wavelet Bior 1.5. This research work is done for the detection, discrimination and locality of faults at distributed generators (DG’s) integration in multi-terminal transmission system. The algorithm tested under various faults with fault inception angles (FIA), fault impedances and fault distance of feeder line.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Judit, Feith Helga. "Where Law and Digital Health Care Meet…". Bulletin of Medical Sciences 92, n.º 2 (1 de diciembre de 2019): 79–88. http://dx.doi.org/10.2478/orvtudert-2019-0017.

Texto completo
Resumen
Abstract The modern information and communication tools and technologies of the 21st century open up new opportunities for patients and healthcare providers, thus contributing to human health, reducing the number of morbidities and premature deaths. The application of modern technology in healthcare has resulted in a number of positive changes, but it has also been subject to multiple challenges, including legal dilemmas in this area: e.g. data management, data security and data protection, access to eHealth, etc. After a brief introduction to the legal history of healthcare and the presentation of key statistics related to the current digital situation, the main objective of the present work is to analyze the relationship between health digitalization and law. One of the key issues for successful healing in all historical eras is the legal protection and respect of patients and healthcare workers in the face of changes in the modern world. For this reason, it is important to address this unusual dimension of health care.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Khan, Muhammad Asif, Umar Ajaib Khan, Asim Ali, Fawad Hussain y Wasif Nisar. "A Robust Color Image Watermarking Scheme using Chaos for Copyright Protection". Mehran University Research Journal of Engineering and Technology 38, n.º 2 (1 de abril de 2019): 361–78. http://dx.doi.org/10.22581/muet1982.1902.11.

Texto completo
Resumen
An exponential growth in multimedia applications has led to fast adoption of digital watermarking phenomena to protect the copyright information and authentication of digital contents. A novel spatial domain symmetric color image robust watermarking scheme based on chaos is presented in this research. The watermark is generated using chaotic logistic map and optimized to improve inherent properties and to achieve robustness. The embedding is performed at 3 LSBs (Least Significant Bits) of all the three color components of the host image. The sensitivity of the chaotic watermark along with redundant embedding approach makes the entire watermarking scheme highly robust, secure and imperceptible. In this paper, various image quality analysis metrics such as homogeneity, contrast, entropy, PSNR (Peak Signal to Noise Ratio), UIQI (Universal Image Quality Index) and SSIM (Structural Similarity Index Measures) are measures to analyze proposed scheme. The proposed technique shows superior results against UIQI. Further, the watermark image with proposed scheme is tested against various image-processing attacks. The robustness of watermarked image against attacks such as cropping, filtering, adding random noises and JPEG compression, rotation, blurring, darken etc. is analyzed. The Proposed scheme shows strong results that are justified in this paper. The proposed scheme is symmetric; therefore, reversible process at extraction entails successful extraction of embedded watermark.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Krainiuk, O., Yu Buts y V. Barbachyn. "SWOT ANALYSIS OF THE IMPLEMENTATION OF DIGITAL TECHNOLOGIES TO ENSURE OCCUPATIONAL SAFETY". Municipal economy of cities 3, n.º 163 (29 de junio de 2021): 234–38. http://dx.doi.org/10.33042/2522-1809-2021-3-163-234-238.

Texto completo
Resumen
The business community and governments around the world are aware of the need to accelerate the process of digitalization and digital transformation of the economy in order to achieve a competitive position in the digital space of the new world economy, including in the field of occupational safety management (SWOP). The mechanism of digitalization in OSH remains insufficiently studied, which necessitates the development of tools for its implementation, evaluation and management. The benefits of digitalization for industrial safety are incredibly high: it is easier to manage resources, and quick access to more information about the use of personal protective equipment, training, medical examination, etc., the formation of digital culture. The purpose of this research was to consider the prospects and problems of implementation of information technology in the field of occupational safety, identify features of industrial enterprise management in the context of digitalization. To achieve this goal, the method of SWOT-analysis was used. The study revealed some problems in the implementation of digitalization in the management system of labor protection. The spread of digital technologies in all sectors of the economy and vital spheres of society actualizes the study of the degree of readiness for change, which involves monitoring the state of occupational safety. Transformations in the labor market and ensuring the safety of the production process are associated with job losses, the emergence of new professions and changes in the competencies of employees. Digitalization is aimed at the introduction of adaptive practices of professional development, the development of motivation in the implementation of all instructions on occupational safety.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Ali, Jabir y Satya Prakash Ghrera. "A novel method for copyright protection of digital videos using SWEA and ZPA technique". International Journal of Engineering & Technology 7, n.º 2.9 (1 de junio de 2018): 90. http://dx.doi.org/10.14419/ijet.v7i2.9.10547.

Texto completo
Resumen
Digital copyright protection has become an effective way to prove the ownership and protect the multimedia contents from illegal use and unauthorized users. In order to prove the ownership of a video certain security program is embedded in a video and one of the ways of ensuring the ownership of a video is embedding the watermark in a video. In this paper, a new approach to digital video copyright protection, SWEA (Split watermark embedding algorithm) with Zero Padding Algorithm (ZPA) is proposed. With the help of this algorithm, it is hard to know the original pattern of watermark because of SWEA and minimizing the perceptual degradation of watermarked video because of ZPA. Here we are using ‘db1’ wavelet domain for embedding the watermark in the LL sub-band of the original identical frame (I-frame), based on the energy of high-frequency sub-band in an adaptive manner. SCD (Scene changed detection) is used to find out the identical frame (I-frame). The proposed algorithm has undergone various attacks, such as compression, uniform noise, Gaussian noise frame repetition and frame averaging attacks. The proposed algorithm, sustain all the above attacks and offers improved performance compared with the other methods from the literature.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Abdul Wahab, Hala y Sura Sarab. "Partial Encryption in Digital Image Based On Plasma Encoding Techniques". Iraqi Journal for Computers and Informatics 41, n.º 1 (31 de diciembre de 2014): 26–31. http://dx.doi.org/10.25195/ijci.v41i1.94.

Texto completo
Resumen
Many digital services require reliable security in storage and transmission of digital images. Due to the rapid growth of theinternet in the digital world today, the security of digital images has become more important and attracted much attention. The prevalenceof multimedia technology in our society has promoted digital images to play a more significant role than the traditional texts, whichdemand serious protection of users' privacy for all applications. Encryption techniques of digital images are very important and should beused to frustrate unauthorized access from opponents. In this paper a new approach is proposed for partial encryption in digital imagebased on dragging the longest wavelength color in digital image then input the extract color to the plasma encoding algorithm to havepartial ciphered image that can be deciphered at the recipient side using the proposed retrieve algorithm. It is possible to apply multilevelfor the proposed approach to increase the security level with less time for encryption/decryption. The new approach test appeared that theencryption/decryption processes was very flexible and efficient.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Rusakova, Ekaterina P. "Integration of “smart” technologies in the civil proceedings of the People’s Republic of China". RUDN Journal of Law 25, n.º 3 (23 de agosto de 2021): 622–33. http://dx.doi.org/10.22363/2313-2337-2021-25-3-622-633.

Texto completo
Resumen
The concept of creating digital justice is not quite new in the modern world, but its implementation takes place in various countries in different ways. China has achieved tangible success, where artificial intelligence technologies are gradually being integrated into judicial proceedings. A robot judge is a real mechanism for resolving a dispute, and people's attitude to this form of protection of the fundamental right guaranteed by the state is mixed, but as practice shows, this method is acceptable in the era of the digital revolution. The research purpose is to identify the main trends in the process of integrating smart technologies in the civil proceedings of the Peoples Republic of China based on artificial intelligence technologies. The research has identified 1) common for all countries stages collaboration between artificial intelligence and humans; 2) various obstacles to introduction into the judicial system of independent units specilising in dispute resolution that are connected with Internet; 3) basic technologies required to create smart courts; 4) main tasks for ensuring social guarantees in the digital form of civil rights protection; 5) main trends in the process of digitalization of civil proceedings. The study led to the conclusion that artificial intelligence technologies have deeply penetrated the Chinese justice system, radically changing all judicial activities, as well as procedural institutions. Close cooperation of IT companies, judicial community and government agencies ensured the success of this process.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Grin, E. S. y A. G. Koroleva. "FORMATION OF BASIC MODELS OF PROTECTION OF TECHNOLOGIES OF VIRTUAL AND AUGMENTED REALITY IN THE CONTEXT OF INTELLECTUAL PROPERTY RIGHTS28". Actual Problems of Russian Law, n.º 6 (18 de julio de 2019): 90–97. http://dx.doi.org/10.17803/1994-1471.2019.103.6.090-097.

Texto completo
Resumen
Digital technologies development has affected almost all spheres of human activity. Today, technologies of virtual and augmented reality can be referred to as the most significant results of digital transformation of the economy. The qualitative development of these technologies, as well as their active and widespread application, leads to many legal problems. One of them involves the problems concerning determination of mechanisms of protection of technologies of virtual and augmented reality, as well as products of their use under the rules of intellectual property law. The article considers peculiarities of the legal nature of virtual and augmented reality technologies, analyzes the concepts of virtuality, virtual and augmented reality in the context of various approaches found in the relevant literature. The paper scrutinizes the main objects of intellectual rights implemented in technologies of virtual and augmented reality, as well as objects generated by them. The authors draw a conclusion that it is possible to ensure protection of the results of intellectual activity and means of individualization by the main institutions of intellectual property rights protection, but the authors express concerns about the need to develop new models to protect the results of creative work in this area.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Ivanov, Sergey O., Aleksandr A. Lariukhin, Maxim V. Nikandrov y Leonid A. Slavutskii. "ACCURACY ESTIMATION FOR OPERATING CHARACTERISTICS NEUROMODELING OF THE OVERCURRENT PROTECTION IN A THREE PHASE MAINS". Vestnik Chuvashskogo universiteta, n.º 1 (25 de marzo de 2021): 68–77. http://dx.doi.org/10.47026/1810-1909-2021-1-68-77.

Texto completo
Resumen
Modern electric power facilities-stations and high-voltage substations have become digital objects with the active use of high-speed local networks directly involved in the technological process. Management, analysis and control of information exchange in the digital substation of the power system require the development of new tools and approaches. For these purposes, machine learning methods can be used, in particular, the artificial neural networks. The paper presents the results of neural network modeling of the operation of the overcurrent protection – as a variant of the information exchange analysis. An elementary perceptron is used as a neural network with the simplest structure. The optimized structure of the neural network and estimates of the accuracy of the neural network algorithm are given, depending on the size of the training sample (from 1000 to 50000 records), the number of training epochs. It is shown that the analysis of the neural network algorithm errors encountered during testing of the neural network enables to estimate the threshold (the setting value) current protection depending on the size of the training sample. It is found that the recognition of the protection trigger threshold in neural network modeling is violated only when the all three phase currents in electrical mains are close to the threshold. The possibilities of improving the proposed approach and its use for detecting anomalies in the information exchange and operation of secondary equipment of digital substations of the power system are discussed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía