Artigos de revistas sobre o tema "Cyberhot"

Siga este link para ver outros tipos de publicações sobre o tema: Cyberhot.

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Cyberhot".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Curran, Kevin, e Sheila Mc Kinney . "Cyberart". Journal of Applied Sciences 4, n.º 4 (15 de setembro de 2004): 531–36. http://dx.doi.org/10.3923/jas.2004.531.536.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

LEVIN, BRIAN. "Cyberhate". American Behavioral Scientist 45, n.º 6 (fevereiro de 2002): 958–88. http://dx.doi.org/10.1177/0002764202045006004.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Lewis, Mike. "CYBERLOG". Health Libraries Review 5, n.º 3 (setembro de 1988): 211–14. http://dx.doi.org/10.1046/j.1365-2532.1988.5302102.x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Porett, Tom. "Cyberart Considerations". Art Journal 53, n.º 3 (1994): 32. http://dx.doi.org/10.2307/777416.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Meyer, Helen. "Cybercop scanner". Computers & Security 18, n.º 3 (janeiro de 1999): 234. http://dx.doi.org/10.1016/s0167-4048(99)90941-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Douglas, Karen M., Craig Mcgarty, Ana-Maria Bliuc e Girish Lala. "Understanding Cyberhate". Social Science Computer Review 23, n.º 1 (fevereiro de 2005): 68–76. http://dx.doi.org/10.1177/0894439304271538.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Maulitz, R. C., J. A. Ohles, R. L. Schnuth, M. S. Lipsky e R. J. Grealish. "The CyberDoc project". Academic Medicine 71, n.º 12 (dezembro de 1996): 1325–8. http://dx.doi.org/10.1097/00001888-199612000-00014.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Bakalis, Chara. "Rethinking cyberhate laws". Information & Communications Technology Law 27, n.º 1 (30 de outubro de 2017): 86–110. http://dx.doi.org/10.1080/13600834.2017.1393934.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Celik, Serkan. "Experiences of internet users regarding cyberhate". Information Technology & People 32, n.º 6 (2 de dezembro de 2019): 1446–71. http://dx.doi.org/10.1108/itp-01-2018-0009.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Purpose The purpose of this paper is to explore internet users’ experiences of cyberhate in the aspects of ethnicity, religion, sexual preference and political perspective. Design/methodology/approach Researchers employed an exploratory survey method to examine internet users’ experiences of cyberhate. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users with high-level digital literacy skills. The data were collected from 355 internet users affiliated with two universities in Turkey and the USA using a personal data form and a survey (Cyberhate Experience Survey) of which reliability and validity indexes were ensured. Findings The results indicated that participants have observed and experienced cyberhate at different levels targeting their ethnic, religious, gender-based and political identities. The findings also pointed out that gender, income and socio-political identities are significant variables on exposure to cyberhate regardless of cultural and educational boundaries. The majority of survey respondents reported that they had encountered cyberhate mostly on social media platforms. Social implications The findings of the study imply that to address the hate speech problem comprehensively, the author must enlighten people, change their way of thinking and broaden their perspectives by using measures such as intercultural dialogue, critical thinking, media literacy, education on tolerance and diversity. Originality/value This research was intended to contribute into the need to elaborate on various aspects of cyberhate, which is shared by academics, thinkers, journalists and educators. It may also serve to clarify how frequently internet users encounter hateful content and harassment online, which can have social consequences and influence young people’s trust to other people.
10

Celik, Serkan. "Tertiary-level internet users’ opinions and perceptions of cyberhate". Information Technology & People 31, n.º 3 (4 de junho de 2018): 845–68. http://dx.doi.org/10.1108/itp-05-2017-0147.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
PurposeThe purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.Design/methodology/approachA sectional research design and survey method was adopted throughout the study to examine the opinions and perceptions of internet users regarding cyberhate by descriptively exploring the existing situation from various perspectives. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users who are considered as highly literate in technology use. The data were collected through a personal data form and a survey (Cyberhate Perception Scale) from 372 internet users living in Turkey and the USA.FindingsThe findings of the study revealed that the majority of participants do not perceive cyberhate as a part of freedom of speech and they believe that online hate behaviors, which they also consider to be a violation of human rights, should be deemed illegal and be punished accordingly. The findings, which were discussed in line with the existing research, indicated some significant predictors of internet users’ perceptions on cyberhate.Originality/valueAs cyberhate is an understudied area that raises concerns in terms of internet user exposure, the objective of this research is to understand tendencies about the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.
11

Ahn, Sung H., V. Sundararajan, Charles Smith, Balaji Kannan, Roshan D’Souza, Ganping Sun, Ashish Mohole et al. "CyberCut: An Internet-based CAD/CAM System". Journal of Computing and Information Science in Engineering 1, n.º 1 (1 de janeiro de 2001): 52–59. http://dx.doi.org/10.1115/1.1351811.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
“CyberCut™” is a testbed for an Internet-based CAD/CAM system. It was specifically designed to be a networked, automated system, with a seamless communication flow from a client-side designer to a server-side machining service. The creation of CyberCut required several new software modules. These include: a) a Web-based design tool in which Design-for-Manufacturing information and machining rules constrain the designer to manufacturable parts; b) a geometric representation called SIF-DSG, for unambiguous communication between the client-side designer and the server-side process planner; c) an automated process planning system with several sub-modules that convert an incoming design to a set of tool-paths for execution on a 3-axis CNC milling machine. Using this software-pipeline, a CyberCut service, modeled on the MOSIS service for VLSI chips, has been now been launched for limited student-use at a group of cooperating universities.
12

Meyer, Helen. "Cybercop takes on network snoops". Computers & Security 15, n.º 8 (janeiro de 1996): 685. http://dx.doi.org/10.1016/s0167-4048(97)89701-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Perry, Barbara, e Patrik Olsson. "Cyberhate: the globalization of hate". Information & Communications Technology Law 18, n.º 2 (julho de 2009): 185–99. http://dx.doi.org/10.1080/13600830902814984.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Viires, Piret. "Literature in Cyberspace". Folklore: Electronic Journal of Folklore 29 (2005): 153–74. http://dx.doi.org/10.7592/fejf2005.29.cyberlit.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Belykh, Vladimir S., e Vladislav O. Puchkov. "The Cybertort Concept in the Anglo-American Law". Jurist 10 (1 de outubro de 2020): 2–11. http://dx.doi.org/10.18572/1812-3929-2020-10-2-11.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Domingues, Diana. "Cyberart and interfaces: the coupled body". Digital Creativity 15, n.º 3 (agosto de 2004): 159–74. http://dx.doi.org/10.1080/14626260408520177.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Nanduri, Ashok Kumar, G. L. Sravanthi, K. V. K. V. L. Pavan Kumar, Sadhu Ratna Babu e K. V. S. S. Rama Krishna. "Modified Fuzzy Approach to Automatic Classification of Cyber Hate Speech from the Online Social Networks (OSN’s)". Revue d'Intelligence Artificielle 35, n.º 2 (30 de abril de 2021): 139–44. http://dx.doi.org/10.18280/ria.350205.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The extensive use of online media and sharing of data has given considerable benefits to humankind. Sentimental analysis has become the most dynamic and famous application area in current days, which is mainly used in knowing the public's opinion. Most algorithms of machine learning are used as principle methods for sentimental analysis. Even though several methods are available for classification and reviews, all of them belong to a single class of classification which differs among several different classes. No methods are available for the classifying of multi-class instances. Therefore, fuzzy methods are used for classifying the instances depended on multi-class for achieving a clear-cut view by indicating suitable labels to objects during the classification of text. This paper includes the categorization of cyberhate information. If there is a growth in dislike speeches of the online social network may lead to a worse impact amongst social activities, which causes tensions among communication and regional. So, there is the most demand for cyberhate conversation detection automatically through online social media. Generally, an updated process of fuzzy words is designed that includes two stages of training for the classification of cyberhate conversation into 4 forms, race, disability, sexual orientation, and religion. Depended on the types of classification, experiments have been conducted on these four forms by gathering different conversations through online media. Systems based on rules of fuzzy approach have been used. This fuzzy with rule-based is for the classification of features using Machine Learning techniques such as the words that implants for future bag-of-words and extraction methods. In this, the cyberhate conversations are taken from OSN's depended on the attributes defined in a dataset using rule-based fuzzy.
18

Brown, Alexander. "What is so special about online (as compared to offline) hate speech?" Ethnicities 18, n.º 3 (19 de maio de 2017): 297–326. http://dx.doi.org/10.1177/1468796817709846.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
There is a growing body of literature on whether or not online hate speech, or cyberhate, might be special compared to offline hate speech. This article aims to both critique and augment that literature by emphasising a distinctive feature of the Internet and of cyberhate that, unlike other features, such as ease of access, size of audience, and anonymity, is often overlooked: namely, instantaneousness. This article also asks whether there is anything special about online (as compared to offline) hate speech that might warrant governments and intergovernmental organisations contracting out, so to speak, the responsibility for tackling online hate speech to the very Internet companies which provide the websites and services that hate speakers utilise.
19

Jane, Emma A. "Feminist Digilante Responses to a Slut-Shaming on Facebook". Social Media + Society 3, n.º 2 (abril de 2017): 205630511770599. http://dx.doi.org/10.1177/2056305117705996.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
This article examines feminist digilantism in response to the “slut-shaming” of an Australian woman on Facebook in 2015. The activism is used to highlight the nature and significance of the feminist pushback against the worsening problem of cyber violence against women and girls (cyber VAWG). This article builds on my previous research into feminist digilantism and is part of a much larger, mixed-methods, multi-modal study into gendered cyberhate. It uses approaches from Internet historiography, ethnography, and netnography, alongside data drawn from qualitative interviews. Sufficient evidence is available to support the broad argument that the feminist digilantism involved in the case study under analysis was efficacious as well as ethically justified given the dearth of institutional interventions. That said, I demonstrate that while such activism has benefits, it also has risks and disadvantages, and raises ethical issues. This critique of digilantism is not intended as yet another type of victim blaming which suggests the activist responses of cyberhate targets are flawed. Instead, my case is that appraising the efficacy and ethics of such forms of extrajudicial activism should take place within a framing acknowledging that these actions are primarily diagnostic of rather than a solution to cyber VAWG. As such, the increasing prevalence and strength of feminist digilantism lends further support to the case that gendered cyberhate is a problem demanding urgent and multifaceted intervention.
20

Rapoport, Sonya. "Color in the Shadows: Bay Area Cyberart". Leonardo 28, n.º 1 (1995): 77. http://dx.doi.org/10.2307/1576170.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Yékú, James. "Akposdoncome again:†Nigerian cyberpop hero as trickster". Journal of African Cultural Studies 28, n.º 3 (7 de agosto de 2015): 245–61. http://dx.doi.org/10.1080/13696815.2015.1069735.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

A. MOONEY J. G. BLIGH, G. "CyberIST :a virtual game for medical education". Medical Teacher 20, n.º 3 (janeiro de 1998): 212–16. http://dx.doi.org/10.1080/01421599880940.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Kubota, Toru. "Clinical Evaluation of the Cyberhoby Computer System". Journal of Japan Gnathology 8, n.º 3-4 (1987): 27–32. http://dx.doi.org/10.14399/jacd1982.8.3-4_27.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Bishop, Charles. "Cyberlog: The Journal of Applied Medical Software". Serials Review 12, n.º 1 (março de 1986): 5. http://dx.doi.org/10.1080/00987913.1986.10763662.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Bishop, Charles. "Cyberlog: The Journal of Applied Medical Software". Serials Review 12, n.º 1 (março de 1986): 5. http://dx.doi.org/10.1016/0098-7913(86)90003-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Wachs, Sebastian, Manuel Gámez-Guadix, Michelle F. Wright, Anke Görzig e Wilfried Schubarth. "How do adolescents cope with cyberhate? Psychometric properties and socio-demographic differences of a coping with cyberhate scale". Computers in Human Behavior 104 (março de 2020): 106167. http://dx.doi.org/10.1016/j.chb.2019.106167.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Jane, Emma A. "Systemic misogyny exposed: Translating Rapeglish from the Manosphere with a Random Rape Threat Generator". International Journal of Cultural Studies 21, n.º 6 (2 de novembro de 2017): 661–80. http://dx.doi.org/10.1177/1367877917734042.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Misogyny online in forms such as explicit rape threats has become so prevalent and rhetorically distinctive it resembles a new dialect or language. Much of this ‘Rapeglish’ is produced by members of an informal alliance of men’s groups online dubbed the ‘Manosphere’. As both a cyberhate researcher and cyberhate target, I have studied as well as contributed to feminist responses to Rapeglish. In 2016, for instance, I helped build a Random Rape Threat Generator (RRTG) – a computer program that splices, shuffles around, and re-stitches in novel combinations fragments of real-life Rapeglish to illustrate the formulaic, machine-like, and impersonal nature of misogynist discourse online. This article uses Yuri Lotman’s ideas about intra- and inter-cultural conflict involving something akin to the translation of a foreign language to frame the RRTG as one example of the way women are ‘talking back’ both to and with Rapeglish (the latter involving appropriations and subversions of the original discourse).
28

Stanley, Ruth. "Software Review: CYBERLOG. Perspectives in Rational Management: Hypertension". DICP 24, n.º 9 (setembro de 1990): 896. http://dx.doi.org/10.1177/106002809002400938.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Bowman, Joseph. "Cyberhood Connections: Educational Webmasters and Designing Hypermedia Environments". Journal of Educational Technology Systems 25, n.º 2 (dezembro de 1996): 117–25. http://dx.doi.org/10.2190/36d4-rrgc-r5wd-3cl9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
As access to the Internet grows, educators are defining how to use its resources for classroom instruction, alternative education models, and as an instructional tool that supports student learning and achievement. The Center for Urban Youth and Technology (CUYT) has developed a design model that introduces educators, teachers, and students to hypermedia and the Internet. The basis for the CyberHood initiative is a concern about the economic and educational conditions in urban cities and a belief in the potential of technology to support and improve the same. Working collaboratively with an Internet web company (the Aframian World Enterprises) and a school-to-work program (Youth Construction Initiative Program) at the University at Albany, our research focused on development of an educational hypermedia model for instruction and design.
30

Jane, Emma A. "Gendered cyberhate as workplace harassment and economic vandalism". Feminist Media Studies 18, n.º 4 (16 de março de 2018): 575–91. http://dx.doi.org/10.1080/14680777.2018.1447344.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Walsh, Crosbie. "Political blogs on Fiji: A ‘cybernet democracy’ case study". Pacific Journalism Review : Te Koakoa 16, n.º 1 (1 de maio de 2010): 154–77. http://dx.doi.org/10.24135/pjr.v16i1.1015.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Political blogging in politically unstable and repressive countries has been seen as a form of cybernet democracy. This research article examines this claim in post-coup Fiji in the wake of the 2006 military takeover, details the author’s experiences with blogging, comments on the Fiji blogosphere in a climate of conflict, and attempts an analysis of the overall pro and anti-government blog landscape that involves more than 70 political blogs. Unlike earlier published research on Fiji blogs, it is an ‘insider’ view, written by an academic who is also a blog publisher—publishing Fiji As It Was, Is and Can Be (FAIW).
32

Pilloy, W. J. "CyberPET: a PET service distributed over a wide area". Nuclear Medicine Communications 23, n.º 12 (dezembro de 2002): 1232–33. http://dx.doi.org/10.1097/00006231-200212000-00038.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Blaya, Catherine. "Cyberhate: A review and content analysis of intervention strategies". Aggression and Violent Behavior 45 (março de 2019): 163–72. http://dx.doi.org/10.1016/j.avb.2018.05.006.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Ahn, S. H., S. McMains, C. H. Séquin e P. K. Wright. "Mechanical implementation services for rapid prototyping". Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 216, n.º 8 (1 de agosto de 2002): 1193–99. http://dx.doi.org/10.1243/095440502760272467.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Inspired by the metal oxide system implementation service (MOSIS) project, CyberCut is an experimental fabrication testbed for an Internet-accessible, computerized prototyping and machining service. Client-designers can create mechanical components, generally using our web-based computer aided design (CAD) system (available at http://cad.berkeley.edu ), and submit appropriate files to the server at Berkeley for process planning. CyberCut then utilizes an open-architecture, computer numerical control (CNC) machine tool for fabrication. Rapid tool path planning, novel fixturing techniques and sensor-based precision machining techniques allow the designer to take delivery of a component machined from high-strength materials with good tolerances, e.g. ±0.002in (0.05 mm). There are also instances where the complex geometry of a component cannot be prototyped on our three-axis machine tool. For these components use is made of solid freeform fabrication (SFF) technologies such as fused deposition modelling (FDM) to build a prototype of the design. Based on experience with this testbed, a new characterization of types of relationship, or ‘couplings’, between design and manufacturing has been developed using the three classifications ‘loose and repetitive’, ‘stiff and one-way’ or ‘strong and bidirectional’. These three couplings represent different trade-offs between ‘design flexibility’ and ‘guaranteed manufacturability’.
35

Sidiq, Hadi Kurniawan, Dana Sulistyo Kusumo e Indra Lukmana Sardi. "Mendeteksi Cyberhate pada Twitter Menggunakan Text Classification dan Crowdsourced Labeling". Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI) 8, n.º 4 (20 de novembro de 2019): 315. http://dx.doi.org/10.22146/jnteti.v8i4.530.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Smith, Charles S., e Paul K. Wright. "CyberCut: A World Wide Web based design-to-fabrication tool". Journal of Manufacturing Systems 15, n.º 6 (janeiro de 1996): 432–42. http://dx.doi.org/10.1016/s0278-6125(97)83056-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Mauro, Vincent F. "Book Review: Cyberlog: A Library of Applied Medical Software: Arrhythmias". DICP 25, n.º 6 (junho de 1991): 684. http://dx.doi.org/10.1177/106002809102500631.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Abel, Pierre, Pascal Gros, Didier Loisel, Cristina Russo Dos Santos e Jean-Pierre Paris. "CyberNet: A framework for managing networks using 3D metaphoric worlds". Annales Des Télécommunications 55, n.º 3-4 (março de 2000): 131–42. http://dx.doi.org/10.1007/bf03001906.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Khorrami, E. "E-Health und Cyberdoc - Gesundheitsportale im Blickfeld von Standesrecht und Qualitätssicherung". Das Gesundheitswesen 64, n.º 8/9 (agosto de 2002): 466–75. http://dx.doi.org/10.1055/s-2002-33779.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Mrđenović, Maja. "Hatsune Miku: The subversive potential of a participatory-created cyberpop idol". Kultura, n.º 169 (2020): 113–29. http://dx.doi.org/10.5937/kultura2069113m.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Virtual worlds and online interactions are the base of cyberpop culture, in which consumption also causes production of meaning. It possibly can, but does not have to bring out subversive and/or activist potential. The overflow of the virtual into the spaces of physical reality, by use of technologies as gestural interfaces, holographic projections and the like, allows direct bodily interactions with virtual objects. Some of these objects are so-called virtual idols. Their appearance, identity and celebrity status are constructed and assigned by real people in the real world. This paper analyses the role of fans in the creation of the most famous virtual idol, the vocaloid Hatsune Miku. Based on this analysis, the paper puts forward a thesis that existence of Hatsune Miku puts emphasis on the activity (participation) per se, instead of activism. It does not serve the idea of social change, but the maintaining of the social status quo.
41

Sundararajan, V., e Paul K. Wright. "Feature Based Macroplanning Including Fixturing". Journal of Computing and Information Science in Engineering 2, n.º 3 (1 de setembro de 2002): 179–91. http://dx.doi.org/10.1115/1.1526506.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Macroplanning is concerned with deciding on setups and sequences of operations by taking into account interactions between features and issues of fixturing. The algorithms presented in this paper use a set of features arranged in a graph-like data structure to determine the fixture configurations and setups. Operation sequences for the features and tool-paths are determined by separate modules working in conjunction with the macroplanner. Examples are presented to demonstrate the capability of the algorithms implemented in an integrated CAD/ CAM system called CyberCut.
42

Kumkale, Zeynep, e Abdullah Adiguzel. "The impact of cyberhunt on reading comprehension level in foreign language teaching". Journal of Higher Education and Science 9, n.º 2 (2019): 268. http://dx.doi.org/10.5961/jhes.2019.329.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Oksanen, Atte, Markus Kaakinen, Jaana Minkkinen, Pekka Räsänen, Bernard Enjolras e Kari Steen-Johnsen. "Perceived Societal Fear and Cyberhate after the November 2015 Paris Terrorist Attacks". Terrorism and Political Violence 32, n.º 5 (9 de abril de 2018): 1047–66. http://dx.doi.org/10.1080/09546553.2018.1442329.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Sobocki, J., P. Thor, G. Krolczyk, J. Uson, I. Diaz-Guemes e M. Lipinski. "The Cybergut. An Experimental Study on Permanent Microchip Neuromodulation for Control of Gut Function". Acta Chirurgica Belgica 102, n.º 2 (janeiro de 2002): 68–70. http://dx.doi.org/10.1080/00015458.2002.11679268.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Wachs, Sebastian, Michelle F. Wright e Alexander T. Vazsonyi. "Understanding the overlap between cyberbullying and cyberhate perpetration: Moderating effects of toxic online disinhibition". Criminal Behaviour and Mental Health 29, n.º 3 (junho de 2019): 179–88. http://dx.doi.org/10.1002/cbm.2116.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Trofymenko, Olena, Yuliia Prokop, Nataliia Lohinova e Oleksandr Zadereiko. "Monitoring of Cybersecurity Level of Ukraine in World Ratings". Information Security of the Person, Society and State, n.º 27 (2019): 119–26. http://dx.doi.org/10.51369/2707-7276-2019-3-13.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The article is devoted to monitoring of the level of cybersecurity of Ukraine in world rankings. The authors’ attention was focused on analyzing the main problems of building a national cyber defense system, considering international experience. According to the authors, ensuring the cybersecurity of the country is possible only with the comprehensive and continuous use of legal and technical methods of protection not only at the national, but also at the international level. International cooperation will ensure an adequate level of cybersecurity and protect information infrastructures in modern conditions of the information society development. Key words: cybersecurity, cyberat-tacks, cyber incidents, cyberthreat, infor-mation security, cybersecurity strategy.
47

Storey, Patrick B. "Hypertension. A review of third issue of cyberlog. Michael G. Sormeyer, M.D. Morris Davidman, M.D." Möbius: A Journal for Continuing Education Professionals in Health Sciences 7, n.º 1 (janeiro de 1987): 71–73. http://dx.doi.org/10.1002/chp.4760070112.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Sakabe, Fabiana Forti, Daniel Iwai Sakabe, Fátima Regina Marracini Fernandes e Gisele Reges. "Estimulação pulsada de alta voltagem reduz a área de úlceras de diferentes etiologias". Fisioterapia Brasil 19, n.º 1 (17 de março de 2018): 72. http://dx.doi.org/10.33233/fb.v19i1.2124.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
As úlceras são definidas como rupturas de estruturas anatômicas do corpo, levando ao comprometimento da função fisiológica dos tecidos envolvidos. A estimulação elétrica de alta voltagem (EEAV) pode auxiliar na cicatrização de tecidos. O objetivo desse estudo foi avaliar o efeito de 30 sessões de EEAV na cicatrização de úlceras de diferentes etiologias. Participaram 6 voluntários e foram tratadas 10 úlceras cutâneas. Para quantificar a área das lesões (cm2) foi realizada a fotogrametria a cada 10 sessões (câmera digital Sony Cybershot, 7.2 megapixels). A intervenção consistiu na aplicação da EEAV (T=100 ms; f= 100 Hz; intensidade de100 a 150 V), 2 a 3x/semana, por 30 minutos. Os eletrodos ativos (negativo) foram fixados sobre a lesão e o dispersivo (positivo) fixado no trajeto vascular. Com relação à área das lesões por pressão, a úlcera sacral reduziu 84,10% da sua área, a trocanteriana e do maléolo medial cicatrizaram completamente em 10 sessões. As úlceras neuropáticas fecharam completamente em 20 sessões. As cinco úlceras venosas (região do tornozelo), apresentaram redução em sua área de 26,29%, 80%, 44,69%, 28,23% e 6,27%. A EEAV foi eficaz pois promoveu a cicatrização completa de quatro úlceras e auxiliou a redução na área de outras seis lesões.Palavras-chave: estimulação elétrica, cicatrização de feridas, fotogrametria.
49

Kavanagh, Emma, Chelsea Litchfield e Jaquelyn Osborne. "Sporting Women and Social Media: Sexualization, Misogyny, and Gender-Based Violence in Online Spaces". International Journal of Sport Communication 12, n.º 4 (1 de dezembro de 2019): 552–72. http://dx.doi.org/10.1123/ijsc.2019-0079.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
This study investigated gender-based violence targeting high-profile women in virtual environments through the case of women’s tennis. Using a netnographic approach and the lens of third-wave feminism, 2 popular social media platforms (Facebook and Twitter) were analyzed to examine social commentary and fan interaction surrounding the top-5-seeded female tennis players during the Wimbledon Tennis Championships. Athletes were exposed to violent interactions in a number of ways. Four themes were identified through data analysis: threats of physical violence, sexualization that focused on the female physical appearance, sexualization that expressed desire and/or proposed physical or sexual contact, and sexualization that was vile, explicit, and threateningly violent in a sexual or misogynistic manner. Findings demonstrate how social media provides a space for unregulated gender-based cyberhate targeting high-profile women in their workplace in a way that traditional sport media does not.
50

YOSHIDA, Hiroshi, e Hiroatsu MATSUURA. "CyberMol-A Molecular Graphics Program System on the World Wide Web Using the Common Gateway Interface." Journal of Chemical Software 3, n.º 4 (1997): 157–63. http://dx.doi.org/10.2477/jchemsoft.3.157.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Vá para a bibliografia