Статті в журналах з теми "Digital safe"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Digital safe.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Digital safe".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Bedell-Pearce, Jack. "Safe digital transformation for SMEs." Network Security 2018, no. 11 (November 2018): 6–7. http://dx.doi.org/10.1016/s1353-4858(18)30110-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Passot, Guillaume, Bradford J. Kim, Delphine Vaudoyer, Vahan Kepenekian, Isabelle Bonnefoy, Naoual Bakrin, Eddy Cotte, and Olivier Glehen. "Digital Glissonectomy: A Safe Perihepatic Peritonectomy." Annals of Surgical Oncology 23, no. 12 (June 24, 2016): 3978–85. http://dx.doi.org/10.1245/s10434-016-5342-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Kajee, Leila. "Digital Safe Spaces: A Critical Take on Two Digital Moments." International Journal of Learning: Annual Review 17, no. 9 (2010): 1–10. http://dx.doi.org/10.18848/1447-9494/cgp/v17i09/47272.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Lubahn, John D., James Koeneman, and Kaya Kosar. "The digital tourniquet: How safe is it?" Journal of Hand Surgery 10, no. 5 (September 1985): 664–69. http://dx.doi.org/10.1016/s0363-5023(85)80204-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sri-Ram, K. "A fail safe method of digital tourniquet." Injury 36, no. 5 (May 2005): 686. http://dx.doi.org/10.1016/j.injury.2004.11.015.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Willis-Owen, C. A. "A fail safe method of digital tourniquet." Injury 35, no. 6 (June 2004): 636. http://dx.doi.org/10.1016/j.injury.2003.11.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Maget Dominicé, Antoinette, Dario Henri Haux, and Fabienne Sarah Graf. "Saving Content in Digital Surroundings: A Safe Solution?" Pólemos 14, no. 1 (April 28, 2020): 17–45. http://dx.doi.org/10.1515/pol-2020-2003.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractCultural institutions save most of their digital-born and digitalized content within the digital sphere. In doing so, they rely on cloud computing and servers, barely taking into consideration that this infrastructure may fail one day. Furthermore, the institutions seem to factor out that these attempts may be related to profound changes in the digital objects.Our paper aims to explore this situation by focusing on sustainability within the digital realm. In the deliberate process of saving born-digital content, should we run the risk of inadvertently losing the content’s individual character itself? Should we embrace the possibility that dynamic content might be transformed into purely static data – ceasing to be relevant for users?How can we find a solution, set between archiving and the continuous promotion of digital culture? Might it be, that born-digital cultural heritage is not made for storage? Has the eager preservation of cultural heritage become a historical oddity that will not last the test of time, due to its nature?
8

Southworth, James. "Tackle digital dangers." Early Years Educator 22, no. 7 (February 2, 2021): 7. http://dx.doi.org/10.12968/eyed.2021.22.7.7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Digital watchdog Ofcom has reported that children as young as three spend an average of eight hours a week on video sharing platforms such as YouTube – which is why it is vital that educators and parents harness tools to keep them safe online.
9

Szita, Kata. "A Virtual Safe Space?" Journal of Digital Social Research 4, no. 3 (July 29, 2022): 34–55. http://dx.doi.org/10.33621/jdsr.v4i3.91.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Health measures in response to the Covid-19 pandemic have confined millions to their homes and minimized social contacts. During this period, a significant proportion of social activities—including work, education, and recreation—moved to digital media platforms. Among these platforms, social virtual reality (VR) has gained importance offering “alternative” realities in which users can engage with others, participate in cultural and sports events, complete education-related activities, and (mental) health treatments, to name but a few functions. With the increasing popularity of social VR and the expanding range of activities these platforms can host, hitherto-unexplored questions arise regarding social interactions and the representation of virtual bodies. Therefore, the objective of this paper is to outline a potential framework for assessing how avatars that represent various body types and demographic characteristics, such as gender or ethnicity, may impact behaviors and identity. The paper presents a theoretical study that combines social identity theory and theories of intersectionality and applies them to the case of digitally created human-like bodies. By doing this, it illuminates the challenges and benefits virtual reality platforms and digital body representations hold—including remote social interactions due to social isolation and social dynamics based on online personas.
10

Mullen, Mark. "Playing it safe." Journal of Gaming & Virtual Worlds 12, no. 3 (October 1, 2020): 303–19. http://dx.doi.org/10.1386/jgvw_00021_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
For the past 30 years museums and art galleries on both sides of the Atlantic have been resistant to exhibiting digital games as art and have instead embedded them in exhibitions and displays that have portrayed them as exemplars of design. This conservative approach has largely failed to achieve the stated purpose of many of these exhibitions: to foster a wider public appreciation for games and encourage more sophisticated conversations about gaming. This article argues that curators for video game exhibitions have been co-opted by the ideological norms of the tech sector which has produced a reluctance to engage critically with their subject matter and a willingness to overlook ethical problems within the videogame industry.
11

Decurcio, Daniel A., Mike R. Bueno, Julio A. Silva, Marco A. Zaiden Loureiro, Manoel Damião Sousa-Neto, and Carlos Estrela. "Digital Planning on Guided Endodontics Technology." Brazilian Dental Journal 32, no. 5 (September 2021): 23–33. http://dx.doi.org/10.1590/0103-6440202104740.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract The aim of this review is to discuss the digital planning and the use of guided technology in Endodontics. The complexity of the root canals anatomy and the challenges in the microorganism’s control represent risk factors for failure after the infected root canal’s treatment. Scientific improvements associated with technological advances have enabled better predictability of therapeutic procedures results. The development of efficient and modern devices provided safer root canal treatments, with shorter clinical visits and greater patient comfort. Digital endodontics incorporated different tools and developed its own, advancing even further in resolving complex cases. The faithful copy of the internal anatomy provided by the advancement of CBCT devices and software’s, associated with the digital resources of 3D planning and printing, enabled the advent of guided endodontics. This technique is used at different stages of endodontic treatment, with specific indications and greater result predictability. Therefore, this study critically reviewed the potential clinical application of this guided access technique, and the operative steps for its safe performance in managing complex endodontic cases. The main indications are accessing calcified root canals, performing endodontic surgeries in difficult access areas, removing fiberglass posts, and accessing teeth with developmental anomalies. In summary, guided endodontics has been a precise strategy, effective, safe, and clinically applicable. This procedure represents incorporating technological resources and digital planning in the Endodontist clinical practice, increasing predictability to complex cases.
12

Beraldin, J. A. "Eye-safe digital 3-D sensing for space applications." Optical Engineering 39, no. 1 (January 1, 2000): 196. http://dx.doi.org/10.1117/1.602352.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Chmielarz, Sławomir, Tomasz Molenda, Piotr Szymała, and Wojciech Korski. "Conditions for using digital isolators in intrinsically safe applications." Mining - Informatics, Automation and Electrical Engineering 1 (529), no. 1 (2017): 43. http://dx.doi.org/10.7494/miag.2017.1.529.43.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

SMITH, I. M., O. M. B. AUSTIN, and S. L. KNIGHT. "A Simple and Fail Safe Method for Digital Tourniquet." Journal of Hand Surgery 27, no. 4 (August 2002): 363–64. http://dx.doi.org/10.1054/jhsb.2002.0781.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Digital tourniquets are commonly used to provide a bloodless field for surgery to the finger. Such tourniquets, however, are potentially harmful and disastrous consequences occur if they are accidentally left in place. We propose a modification of the rubber glove tourniquet technique that will provide a safe and reliable tourniquet.
15

Sklar, Alissa. "Sound, Smart, and Safe: A Plea for Teaching Good Digital Hygiene." LEARNing Landscapes 10, no. 2 (July 5, 2017): 39–43. http://dx.doi.org/10.36510/learnland.v10i2.799.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The concept of “digital hygiene” addresses the way digital technology can be integrated into our lives in safe, healthy, responsible, and respectful ways. Teaching kids about digital hygiene requires parents to be confident about their role as models and guides for the use of these devices, which is difficult when adults feel—often quite justifiably—that their children’s tech skills outpace their own. This commentary addresses the need for broadening the notion of digital hygiene with input from kids and teens, then educating and supporting parents (and educators) in its application.
16

Gordillo, Aldo, Sonsoles López-Pernas, and Enrique Barra. "Effectiveness of MOOCs for teachers in safe ICT use training." Comunicar 27, no. 61 (October 1, 2019): 103–12. http://dx.doi.org/10.3916/c61-2019-09.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Despite the efforts made, there is still an alarming difference between the digital competence that teachers have and the one they should have in order to develop their students' digital competence. The lack of teacher training in safe and responsible use of ICT is a special cause for concern. Online courses in MOOC format meet all the required conditions to offer a possible solution to the unavoidable and urgent need for initial and in-service teacher training in this area of digital competence. However, there is currently no evidence in the literature on the effectiveness of these courses for this purpose. This study examines the instructional effectiveness of courses in MOOC format for teacher training in the safe and responsible use of ICT by analysing three different official courses. The courses were analysed using three different methods: a questionnaire to measure participants’ perceptions, pre-tests and post-tests to measure the knowledge acquired, and LORI (Learning Object Review Instrument) to measure the quality of digital educational resources created by the participants. The results suggest that online courses in MOOC format are an effective way to train teachers in the safe and responsible use of ICT, and that these courses can enable the development of digital competence in the area of content creation. A pesar de los esfuerzos realizados, aún existe una alarmante diferencia entre la competencia digital que tienen los profesores y la que deberían tener para desarrollar la competencia digital en sus alumnos. De especial preocupación es la carencia de formación del profesorado en uso seguro y responsable de las TIC. Los cursos en línea con formato MOOC reúnen todas las condiciones necesarias para ofrecer una posible solución a la ineludible y apremiante necesidad de formación inicial y continua del profesorado en esta área de la competencia digital. Sin embargo, no existe actualmente evidencia en la literatura sobre la efectividad de estos cursos para tal cometido. Este estudio examina la efectividad instruccional de los cursos con formato MOOC para la formación del profesorado en el uso seguro y responsable de las TIC mediante el análisis de tres cursos oficiales diferentes. Estos se analizaron empleando tres instrumentos diferentes: un cuestionario para medir la percepción de los participantes, pre-tests y pos-tests para medir los conocimientos adquiridos y el instrumento LORI (Learning Object Review Instrument) para medir la calidad de recursos educativos digitales creados por los participantes. Los resultados sugieren que los cursos en línea con formato MOOC constituyen una forma efectiva de formar al profesorado en el uso seguro y responsable de las TIC, y que estos cursos pueden ayudar al desarrollo de la competencia digital en el área de creación de contenidos.
17

Cooper, Anne, and Alison Inglehearn. "Perspectives: Managing professional boundaries and staying safe in digital spaces." Journal of Research in Nursing 20, no. 7 (November 2015): 625–33. http://dx.doi.org/10.1177/1744987115604066.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Austin, Jodie A., Michael A. Barras, and Clair M. Sullivan. "Safe and Effective Digital Anticoagulation: A Continuous Iterative Improvement Approach." ACI Open 05, no. 02 (July 2021): e116-e124. http://dx.doi.org/10.1055/s-0041-1736631.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Background Anticoagulant drugs are the leading cause of medication harm in hospitals and prescribing errors are common with traditional paper prescriptions. Electronic medicines management can reduce prescribing errors for many drugs; however, little is known about the impact of e-prescribing on anticoagulants. Our case study reports on the lessons learned during conversion from paper to e-prescribing and the ongoing optimization process. Methods The iterative implementation of an anticoagulant prescribing platform in an integrated electronic medical record (ieMR) and ongoing continuous enhancements was applied across five digital hospital sites utilizing a single domain. The collaborative management of each class of anticoagulant, optimization strategies, governance structures, and lessons learned is described. An analysis of the rate of errors and adverse events pre- and post-go live is presented. Results The transition to e-prescribing relied on a strong inter-disciplinary governance framework to promote the safe management of anticoagulants. There was no increase in overall prescribing errors, however unfamiliarity with the new system caused a transient increase in errors with unfractionated heparin (1.8/month pre-ieMR vs. 5.5/month post-ieMR). A dedicated real-time surveillance dashboard was introduced. The iterative nature of changes indicated the complexities involved with anticoagulants and the need for an interactive, optimization approach. This led to a significant decrease in anticoagulant related hospital acquired complications (12.1/month pre-ieMR vs. 7.8/month post-ieMR, p = 0.01). Conclusion Digitizing anticoagulant prescribing led to an overall reduction in errors, but a continuous iterative optimization approach was needed to achieve this outcome. The knowledge presented can help inform optimal therapeutic anticoagulation ieMR design strategies.
19

Narayana Rao, T. Venkat, and Budati Naveen Kumar. "GNU Privacy Guard- A Tool for Safe Computing." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (April 26, 2019): 12–15. http://dx.doi.org/10.17762/ijritcc.v7i4.5282.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In the modern era, digital communications play a vital role. For an elementary security, encryption is preventing a huge number of problems. When a data is passed through many number of nodes, we don’t know what vulnerability is present at each node. Our data may be affected. GPG encryption is a tool for encrypting emails, digital materials. It uses the concept of key pairs like public key, private key. The public keys are exchanged between the sender and the receiver. The private key is kept as a secret by user. This paper focus on new GNU privacy guard which is a tool to ensure security in huge users traffic and reliable data transmission .
20

Abate, Alessandro, Iury Bessa, Lucas Cordeiro, Cristina David, Pascal Kesseli, Daniel Kroening, and Elizabeth Polgreen. "Automated formal synthesis of provably safe digital controllers for continuous plants." Acta Informatica 57, no. 1-2 (December 6, 2019): 223–44. http://dx.doi.org/10.1007/s00236-019-00359-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract We present a sound and automated approach to synthesizing safe, digital controllers for physical plants represented as time-invariant models. Models are linear differential equations with inputs, evolving over a continuous state space. The synthesis precisely accounts for the effects of finite-precision arithmetic introduced by the controller. The approach uses counterexample-guided inductive synthesis: an inductive generalization phase produces a controller that is known to stabilize the model but that may not be safe for all initial conditions of the model. Safety is then verified via bounded model checking: if the verification step fails, a counterexample is provided to the inductive generalization, and the process further iterates until a safe controller is obtained. We demonstrate the practical value of this approach by automatically synthesizing safe controllers for physical plant models from the digital control literature.
21

Timofeev, S. S., and S. S. Timofeeva. "The Digital future of labor protection." XXI Century. Technosphere Safety 7, no. 1 (March 30, 2022): 51–62. http://dx.doi.org/10.21285/2500-1582-2022-1-51-62.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Labor protection is the most important element of the social policy of the modern state. Without compliance with labor protection laws and modernizing measures intended to ensure safe working conditions, effective business development is hindered. The labor protection legislation has been amended, the “regulatory guillotine” is being implemented, new legislative acts have been adopted, significant changes have been made to the Labor Code, and the digital transformation of the economy is underway. This paper considers changes in legal and regulatory documents on risk management and labor protection in the context of digitalization, analyzes potential for development of labor protection. In particular, the phenomenon of digitalization is considered, and directions of digitalization in labor protection are classified: achievements in the field of automatic documentation of labor protection procedures are described; control over the safe production of work and working conditions, the state of health of workers and the process of labor protection training of workers are analyzed.
22

Hughes, D. G., P. M. Dixon, and E. W. L. Fletcher. "Augmentation of Upper Limb Venography with Digital Subtraction." Phlebology: The Journal of Venous Disease 2, no. 2 (June 1987): 125–27. http://dx.doi.org/10.1177/026835558700200211.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Наталья Николаевна, Апостолова. "DIGITAL JUSTICE." NORTH CAUCASUS LEGAL VESTNIK 1, no. 1 (March 2022): 130–35. http://dx.doi.org/10.22394/2074-7306-2022-1-1-130-135.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Federal Law No. 44 of December 30, 21 "On Amendments to Certain Legislative Acts of the Russian Federation" legislatively fixed the possibility of transition of arbitration, civil and administrative proceedings to digital justice. In the near future, it is possible to use these technologies in the course of judicial control in pre-trial proceedings, as well as in proceedings before a justice of the peace and in criminal cases. The next step in the development of digital justice will be the creation and implementation of an artificial intelligence system in court proceedings. It is necessary to consolidate as soon as possible the civil, administrative and criminal responsibility of the actors of these organizations for their creation and use in violation of the established rules. The fundamental principles of using AI in justice should be the principles of legality, safe and controlled use of AI, confidentiality of personal information. The development of artificial intelligence should be carried out in order to ensure the conditions for the transition of human civilization to a higher level of spiritual, moral, intellectual and physical development.
24

Crescenzi-Lanna, Lucrezia, Riccardo Valente, and Rafael Suárez-Gómez. "Safe and inclusive educational apps: Digital protection from an ethical and critical perspective." Comunicar 27, no. 61 (October 1, 2019): 93–102. http://dx.doi.org/10.3916/c61-2019-08.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The mediated use of technology fosters learning from early childhood and is a potential resource for inclusive education. Nevertheless, the huge range of options and exposure to interactive digital content, which is often online, also implies a series of risks. The definition of protection underlying the current strategies to protect children is inadequate as it only extends to reducing children's exposure to harmful content. This study proposes the expansion of this definition. Through systematic observation of 200 apps within the Catalan sphere for children under 8 years of age and principal component analysis, the results support a multidimensional conceptualisation of protection which, instead of being restricted to the potential risks, also considers aspects related to the educational and inclusive potential of digital resources. Five factors are suggested in order to select these resources and contribute to the digital competence of teachers and students. The first factor concerns the use of protection mechanisms and the existence of external interference, the second factor indicates the presence of adaptation tools; the exposure to stereotypes corresponds to the third factor and the last two consider the previous knowledge required and the verbal component of the apps. Finally, the scope of the suggested definition and its limitations as a guide for future analysis will be discussed. El uso mediado de la tecnología fomenta el aprendizaje desde la infancia y representa un potencial recurso para la educación inclusiva. Al mismo tiempo, la creciente exposición a contenidos digitales interactivos, a menudo conectados a la red, conlleva una serie de riesgos para los niños. A las estrategias actualmente empleadas para protegerlos, que se limitan a reducir su exposición a contenidos perjudiciales, parece subyacer una definición de protección inadecuada. Esta investigación propone que se amplíe esta definición. A través de una observación sistemática de 200 apps para menores de ocho años en el ámbito catalán y un análisis de componentes principales, se propone una definición multidimensional de protección que no se limita a detallar los riesgos potenciales, sino que también considera aspectos relacionados con el potencial educativo e inclusivo de los recursos digitales. Se sugieren cinco factores a considerar para seleccionar estos recursos y contribuir a la competencia digital de docentes y alumnos. El primer factor concierne al uso de mecanismos de protección y la existencia de interferencias externas; el segundo factor indica la presencia de herramientas de adaptación; la exposición a estereotipos corresponde al tercer factor y los últimos dos consideran los conocimientos previos requeridos y el componente verbal de las apps. Finalmente se discute el alcance de la definición propuesta y sus limitaciones para guiar análisis futuros.
25

TINYAKOVA, Viktoriya, Natalia MOROZOVA, Manya ZIROYAN, and David ARAKELYAN. "Digital Ecosystem as a Model of Efficient and Safe Interaction of Actors in Virtual Space." WISDOM 2, no. 1 (May 26, 2022): 150–57. http://dx.doi.org/10.24234/wisdom.v2i1.777.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In the article, the authors emphasize that the formation and development of the digital economy is an inevitable and objective process of society’s transition to a new technological order. To maintain their competitive state, business entities need to transform the existing business model by integrating smart technologies, the Internet of Things and artificial intelligence into its basis. The emergence of new formal and informal institutions should regulate the rules of behaviour of economic agents in the digital economy. To this end, it is necessary to form and develop a legal framework that regulates the relationship between customers and owners of digital platforms. We believe that digital ecosystems will have a certain interest in the new society. Unlike traditional models of interaction between actors, digital ecosystems will create a single information field and a new form of constructive cooperation and coordination between participants in the virtual space. The state should become the initiator of creating this kind of digital ecosystem, which will make it possible to implement the mechanism of reasonable digital protectionism, the purpose of which will be to protect the interests of users and owners of digital platforms in cyberspace.
26

Maréchal, Nathalie. "FCJMESH-009 Ranking Digital Rights: Keeping the Internet Safe for Advocacy." Fibreculture Journal, no. 26 (December 22, 2015): 302–8. http://dx.doi.org/10.15307/fcj.mesh.009.2015.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Zarins, Emily. "Notice versus Knowledge under the Digital Millennium Copyright Act's Safe Harbors." California Law Review 92, no. 1 (January 2004): 257. http://dx.doi.org/10.2307/3481448.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Bakkum, Michiel J., Jelle Tichelaar, Anne Wellink, Milan C. Richir, and Michiel A. Agtmael. "Digital Learning to Improve Safe and Effective Prescribing: A Systematic Review." Clinical Pharmacology & Therapeutics 106, no. 6 (July 29, 2019): 1236–45. http://dx.doi.org/10.1002/cpt.1549.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Jung, Youeyun, Seongheon Lee, and Hyochoong Bang. "Digital Terrain Map Based Safe Landing Site Selection for Planetary Landing." IEEE Transactions on Aerospace and Electronic Systems 56, no. 1 (February 2020): 368–80. http://dx.doi.org/10.1109/taes.2019.2913600.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Amin, Md Nurul. "Are Cell-Phone and Other Digital Devices Safe To Human Health?" Ibrahim Cardiac Medical Journal 7, no. 1-2 (March 4, 2019): 5–8. http://dx.doi.org/10.3329/icmj.v7i1-2.53953.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Chien, George C. Chang. "Digital Subtraction Angiography is Not the Answer for Safe Epidural Injections." Pain Physician 3;17, no. 3;5 (May 14, 2014): E413—E419. http://dx.doi.org/10.36076/ppj.2014/17/e413.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Anggleni, Andela. "DIPLOMASI DIGITAL DAN IMPLEMENTASI APLIKASI SAFE TRAVEL DI KEMENTERIAN LUAR NEGERI." Jurnal Caraka Prabu 5, no. 2 (December 20, 2021): 187–96. http://dx.doi.org/10.36859/jcp.v5i2.617.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Public Service-Based Information Technology and Communication (ICT), Electronics Neighborhood/Pillars of Citizens (e-RT/RW) (Study of e-Government in Kelurahan Talang Semut Kecamatan Bukit Kecil Kota Palembang). This study is based on the new way to manage public sector-oriented management services to the community forward, rather than the interests of the government. E-Government Program is a program of e-RT/RW Surabaya. The results showed the program e-RT/RW sourced from Palembang Mayor Factors supporting the program e-RT/RW in the Kelurahan Talang Semut, Bukit Kecil, Palembang is the full support of the government and relevant parties, the basic service standards and infrastructure are qualified. Whereas the inhibiting factor is the public interest, a lack of internal party support, and lack of maintenance of infrastructure. From the research, the researchers suggest that the necessary socialization harder, but not merely socialization but also training to people to operate online. Transparent financial accountability. Holding intense communication forum, addition of website content, and control of technical problems with a thorough evaluation.
33

Clark-Parsons, Rosemary. "Building a digital Girl Army: The cultivation of feminist safe spaces online." New Media & Society 20, no. 6 (October 6, 2017): 2125–44. http://dx.doi.org/10.1177/1461444817731919.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
“Safe spaces” emerged as an important activist tactic in the late twentieth-century United States with the rise of feminist, queer, and anti-racist movements. However, the term’s ambiguity, while denoting its wide applicability across movements, has led “safe space” to become overused but undertheorized. In both theory and praxis, “safe space” has been treated as a closed concept, erasing the context-specific relational work required to construct and maintain its material and symbolic boundaries. The emergence of online communities promising safety for marginalized groups calls for renewed investigations into the construction of these activist spaces. In this article, I draw on ethnographic fieldwork to consider the cultivation of safe space within Girl Army, a Philadelphia-based feminist Facebook group. Through participant observation and interviews with Girl Army members, I trace the group’s technical and discursive enforcement of safety and the role this space plays in members’ activism and everyday lives.
34

Nechaeva, O. A. "Digital portfolio of the teacher as a means of developing professional competencies." SHS Web of Conferences 113 (2021): 00069. http://dx.doi.org/10.1051/shsconf/202111300069.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The technology of the electronic portfolio of a teacher is presented, which ensures the continuous development of professional skills and assessment of competencies, for the implementation of effective professional activities using new methods of teaching and education in a modern and safe digital educational environment. The study is aimed at creating an adequate system of continuous professional development of teachers and assessment of competencies based on e-portfolio technology, taking into account Russian and international academic and professional standards, ready and able to implement professional activities at a high-quality level in a modern and safe digital educational environment. The practical significance of the research carried out lies in the organization of continuous professional training and support of pedagogical personnel, the effective assessment of competencies based on the e-portfolio technology in a modern and safe digital educational environment.
35

Meganingratna, Andi, and Afika Nur. "Implementasi Aplikasi Safe Travel Terhadap Perlindungan Warga Negara Indonesia (WNI) di Luar Negeri." NeoRespublica : Jurnal Ilmu Pemerintahan 3, no. 2 (June 14, 2022): 87. http://dx.doi.org/10.52423/neores.v3i2.24746.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstrakSetiap tahun, jumlah WNI yang melakukan perjalanan maupun bermigrasi keluar negeri semakin tinggi. Kurangnya kesadaran WNI untuk melaporkan keberadaannya, membuat pemerintah mengalami kesulitan untuk mendeteksi keberadaan WNI. Terkait dengan pola globalisasi yang dikombinasikan dengan situasi internasional yang tidak menentu membuat WNI yang berada di luar negeri ini bisa saja menghadapi berbagai kondisi yang tidak diinginkan. Banyaknya kasus yang terjadi namun tidak terdeteksi tentu saja menjadi masalah besar dalam perlindungan warga negara. Hal inilah yang mendorong pemerintah Indonesia untuk kemudian menerapkan kebijakan terkait diplomasi digital untuk perlindungan WNI melalui aplikasi Safe Travel. Penelitian ini bertujuan untuk melihat bagaimana implementasi aplikasi Safe Travel yang dijalankan oleh pemerintah Indonesia terhadap perlindungan WNI di luar negeri. Penelitian ini menggunakan konsep diplomasi digital dan konsep perlindungan serta metode kualitatif deskriptif dengan teknik document-based research. Hasil yang ditemukan bahwa aplikasi Safe Travel menjadi salah satu upaya yang dilakukan pemerintah Indonesia dalam membantu perlindungan WNI diluar negeri namun aplikasi ini juga belum memberikan hasil yang maksimal karena adanya keterbatasan pemahaman masyarakat mengenai ini.Kata kunci : Diplomasi Digital, Perlindungan WNI, Safe Travel
36

Guo, Jin, Jin-Huat Low, Yoke-Rung Wong, and Chen-Hua Yeow. "Design and Evaluation of a Novel Hybrid Soft Surgical Gripper for Safe Digital Nerve Manipulation." Micromachines 10, no. 3 (March 15, 2019): 190. http://dx.doi.org/10.3390/mi10030190.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Forceps are essential tools for digital nerve manipulation during digital nerve repair surgery. However, surgeons have to operate forceps with extreme caution to prevent detrimental post-operative complications caused by over-gripping force. Their intrinsically safe characteristics have led to the increasing adoption of soft robotics in various biomedical applications. In this paper, a miniaturized hybrid soft surgical gripper is proposed for safe nerve manipulation in digital nerve repair surgery. This new surgical gripper includes a soft inflatable actuator and a gripper shell with a hook-shaped structure. The ability to achieve a compliant grip and safe interaction with digital nerves is provided by the inflated soft pneumatic actuator, while the rigid hook retractor still allows surgeons to scoop up the nerve from its surrounding tissues during surgery. The performance of the proposed surgical gripper was evaluated by the contact/pulling force sensing experiments and deformation measurement experiments. In the cadaver experiments, this new surgical gripper was able to complete the required nerve manipulation within the limited working space. The average deformation of the digital nerve with an average diameter of 1.45 mm gripped by the proposed surgical gripper is less than 0.22 mm. The average deformity is less than 15% of its original diameter.
37

Dormandy, Katherine. "Digital whiplash: The case of digital surveillance." Human Affairs 30, no. 4 (October 27, 2020): 559–69. http://dx.doi.org/10.1515/humaff-2020-0049.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractDigital technology is rapidly transforming human life. But our cognition is honed for an analog world. I call this the problem of digital whiplash: that the digital transformation of society, like a vehicle whose sudden acceleration injures its occupants, is too fast to be safe. I focus on the unprecedented phenomenon of digital surveillance, which I argue poses a long-term threat to human autonomy that our cognition is ill-suited to recognize or respond to. Human cognition is embodied and context-sensitive, and thus faces four problems of digital whiplash vis-à-vis digital surveillance. First is the problem of signal sparsity, that there are few if any perceptible indications of digital surveillance. Second is the problem of signal elusiveness, that the few indications there are prohibitively difficult to discover. Third is the distraction problem, that using digital technologies corrodes the cognitive abilities we need to recognize and respond to digital surveillance. Fourth is the hooking problem, that digital technologies are engineered to cultivate dependency. I address, among other objections, the idea that we choose to exchange our privacy for the use of digital technologies, so their use is in fact an expression of autonomy. The response to digital whiplash, I argue, is not to slow down the digitalization of society in its current form so that we can adapt our cognitive capacities. It is to allow ourselves the time to reflect on and debate whether digitalization, in its current form, is delivering a socially and ethically desirable future.
38

Brutus, JP, A. Nikolis, Y. Baeten, N. Chahidi, L. Kinnen, P. Ledoux, and JP Moermans. "Reducing Patient Discomfort during Digital Blockade: The Subcutaneous Single Injection Digital Block – A Simple, Safe and Fast Procedure." Canadian Journal of Plastic Surgery 11, no. 1 (March 2003): 33–35. http://dx.doi.org/10.1177/229255030301100108.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Background Regional anesthesia of a single finger is commonly achieved by the traditional ring block, which requires at least two painful injections in the digit. Single injection digital block techniques have been described to avoid this problem. Among these, the subcutaneous technique described by Harbison appears to be safe and to allow most procedures to be carried out with good tolerance. Objectives A prospective study was designed to evaluate the results of the subcutaneous technique in terms of patient tolerance, distribution of anesthesia and efficiency. Methods All blocks were performed by a single investigator. A visual analog scale was used to evaluate pain associated with the injection. Prick testing was used to evaluate the quality of anesthesia at the volar and dorsal aspects of the phalanxes. Tolerance to the surgical procedure and the need for additional injections were also recorded. Results This technique allowed surgery to be performed without complementary injection most of the time and was very well tolerated. The dorsum of the proximal phalanx, however, was unpredictably included in the anesthetized territory. Conclusion The subcutaneous single injection digital block is safe, efficient and easy to perform. It allows the treatment of all conditions on the volar aspect of the finger and on the dorsal aspect of the distal and middle phalanxes. For surgery on the dorsal aspect of the proximal phalanx, a combined single injection technique or a supplementary dorsal block should be used.
39

ILLARRAMENDI REZABAL, MIREN, ASIER IRIARTE, AITOR ARRIETA AGUERRI,, GOIURIA SAGARDUI MENDIETA, and FELIX LARRINAGA BARRENECHEA. "DIGITAL SAFETY MANAGER: IOT SERVICE TO ASSURE THE SAFE BEHAVIOUR OF MACHINES AND CONTROLS IN THE DIGITAL INDUSTRY." DYNA 97, no. 1 (January 1, 2022): 18–22. http://dx.doi.org/10.6036/10243.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The digital industry requires increasingly complex and reliable software systems. They need to control and make critical decisions at runtime. As a consequence, the verification and validation of these systems has become a major research challenge. At design and development time, model testing techniques are used while run-time verification aims at verifying that a system satisfies a given property. The latter technique complements the former. The solution presented in this paper targets embedded systems whose software components are designed by state machines defined by Unified Modelling Language (UML). The CRESCO (C++ REflective State-Machines based observable software COmponents) platform generates software components that provide internal information at runtime and the verifier uses this information to check system-level reliability/safety contracts. The verifier detects when a system contract is violated and initiates a safeState process to prevent dangerous scenarios. These contracts are defined by internal information from the software components that make up the system. Thus, as demonstrated in the tested experiment, the robustness of the system is increased. All software components (controllers), such as the verifier, have been deployed as services (producers/consumers) of the Arrowhead IoT platform: the controllers are deployed on local Arrowhead platforms (Edge) and the verifier (Safety Manager) is deployed on an Arrowhead platform (Cloud) that will consume controllers on the Edge and ensure the proper functioning of the plant controllers. Keywords: run-time monitoring, robustness, software components, contracts, software models, state machines
40

Jemli, M., M. Boussak, M. Gossa, and M. B. A. Kamoun. "Fail-safe digital implementation of indirect field oriented controlled induction motor drive." Simulation Practice and Theory 8, no. 3-4 (September 2000): 233–52. http://dx.doi.org/10.1016/s0928-4869(00)00024-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Kashter, Yuval, Yair Rivenson, Adrian Stern, and Joseph Rosen. "Sparse synthetic aperture with Fresnel elements (S-SAFE) using digital incoherent holograms." Optics Express 23, no. 16 (August 3, 2015): 20941. http://dx.doi.org/10.1364/oe.23.020941.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Shmarov, Fedor, Sadegh Soudjani, Nicola Paoletti, Ezio Bartocci, Shan Lin, Scott A. Smolka, and Paolo Zuliani. "Automated Synthesis of Safe Digital Controllers for Sampled-Data Stochastic Nonlinear Systems." IEEE Access 8 (2020): 180825–43. http://dx.doi.org/10.1109/access.2020.3028476.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Carusi, Carlo, and Claudio Bernardi. "An Easy, Efficient, and Safe Method for Intraoperative Digital Photography by Smartphone." Aesthetic Surgery Journal 36, no. 9 (August 23, 2016): NP284—NP286. http://dx.doi.org/10.1093/asj/sjw136.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Naseem, Mustafa, Fouzia Younas, and Maryam Mustafa. "Designing Digital Safe Spaces for Peer Support and Connectivity in Patriarchal Contexts." Proceedings of the ACM on Human-Computer Interaction 4, CSCW2 (October 14, 2020): 1–24. http://dx.doi.org/10.1145/3415217.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Schmale, H. C., and T. Geddert. "Safe mechanical joining processes by digital manufacturing supervision in steel coil productions." IOP Conference Series: Materials Science and Engineering 1157, no. 1 (June 1, 2021): 012006. http://dx.doi.org/10.1088/1757-899x/1157/1/012006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Flint, David. "Computers and Internet: Is It Safe to Sign On the Digital Line?" Business Law Review 20, Issue 3 (March 1, 1999): 72–75. http://dx.doi.org/10.54648/bula1999022.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Ohmori, Kazunori. "ANDRITZ Cutting-edge Digital Technology for Stable and Safe Recovery Boiler Operation." JAPAN TAPPI JOURNAL 75, no. 11 (2021): 1005–9. http://dx.doi.org/10.2524/jtappij.75.1005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

McInerney, Ciarán D., Beverly C. Scott, and Owen A. Johnson. "Are Regulations Safe? Reflections From Developing a Digital Cancer Decision-Support Tool." JCO Clinical Cancer Informatics, no. 5 (March 2021): 353–63. http://dx.doi.org/10.1200/cci.20.00148.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
PURPOSE Informatics solutions to early diagnosis of cancer in primary care are increasingly prevalent, but it is not clear whether existing and planned standards and regulations sufficiently address patients' safety nor whether these standards are fit for purpose. We use a patient safety perspective to reflect on the development of a computerized cancer risk assessment tool embedded within a UK primary care electronic health record system. METHODS We developed a computerized version of the CAncer Prevention in ExetER studies risk assessment tool, in compliance with the European Union's Medical Device Regulations. The process of building this tool afforded an opportunity to reflect on clinical concerns and whether current regulations for medical devices are fit for purpose. We identified concerns for patient safety and developed nine practical recommendations to mitigate these concerns. RESULTS We noted that medical device regulations (1) were initially created for hardware devices rather than software, (2) offer one-shot approval rather than supporting iterative innovation and learning, (3) are biased toward loss-transfer approaches that attempt to manage the fallout of harm instead of mitigating hazards becoming harmful, and (4) are biased toward known hazards, despite unknown hazards being an expected consequence of health care as a complex adaptive system. Our nine recommendations focus on embedding less-reductionist and stronger system perspectives into regulations and standards. CONCLUSION Our intention is to share our experience to support research-led collaborative development of health informatics solutions in cancer. We argue that regulations in the European Union do not sufficiently address the complexity of healthcare information systems with consequences for patient safety. Future standards and regulations should continue to follow a system-based approach to risk, safety, and accident avoidance.
49

Adom, A. Désiré. "Can Digital Currencies Serve as Safe Havens in the Post-Covid Era?" Business, Management and Economics Research, no. 82 (June 1, 2022): 17–27. http://dx.doi.org/10.32861/bmer.82.17.27.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The exponential growth of digital currencies in general and cryptocurrencies, in particular, has seemingly broken every record in the book. This has generated in the process a tremendous amount of interest in both developed and developing countries from scholars, academics, politicians, decision-makers and other stakeholders. Considering an applied methodology about asymmetric volatility with Exponential General Auto-regressive Conditional heteroscedasticity (EGARCH), this research work explores the fundamentals of the behavior of cryptocurrencies comparatively to a benchmark of key assets. To achieve its goal, this study uses two classes of assets. On the one hand, the first class (Class I) includes seven ̶ Bitcoin, Ethereum, Binance, Dogecoin, Tether, Ripple, and Cardano ̶ of the top 10 cryptocurrencies, which, as of July 2021, commanded more than $1.5 trillion in market capitalization. On the other hand, the second class (Class II) is comprised of three traditionally established, well-known and “safe” assets, namely, gold, the 3-month US treasury bill and the 30-year US treasury bond. Using thousands of datapoints, empirical findings regarding volatilities, returns, clustering and leverage effects of the two asset classes do not reveal any startling contrasts to warrant an outright dismissal of crypto-assets as viable repositories of purchasing power and value. However, the pace in the move towards a full “safe haven” status will hinge upon the introduction of a clear regulatory and legislative framework in the US and other major countries to instill more confidence and certainty about crypto assets in a post-Covid era.
50

Lunev, Andrey. "Safe manufacturing: four directions of video technology development." Okhrana truda i tekhnika bezopasnosti na promyshlennykh predpriyatiyakh (Labor protection and safety procedure at the industrial enterprises), no. 2 (February 26, 2021): 13–16. http://dx.doi.org/10.33920/pro-4-2102-02.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
It is impossible to imagine a modern enterprise without technologies: they significantly simplify work, helping to optimize processes at all stages of production. However, often the main task of industrial digital solutions is to ensure the protection of the health of employees and the protection of wealth. In this case, video surveillance comes to the fore. Andrey Lunev, Head of Intelligent Video Surveillance at Mobotix Konica Minolta Business Solutions Russia, talks about how video technologies can be used in production and what security tasks they solve.

До бібліографії