標(biāo)題: Titlebook: Sustainability in Creative Industries; Innovations in Fashi Muhammad Nawaz Tunio,Jorge Miguel Chica Garcia,Yas Conference proceedings 2024 [打印本頁(yè)] 作者: Agitated 時(shí)間: 2025-3-21 16:22
書(shū)目名稱(chēng)Sustainability in Creative Industries影響因子(影響力)
書(shū)目名稱(chēng)Sustainability in Creative Industries影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Sustainability in Creative Industries網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Sustainability in Creative Industries網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Sustainability in Creative Industries被引頻次
書(shū)目名稱(chēng)Sustainability in Creative Industries被引頻次學(xué)科排名
書(shū)目名稱(chēng)Sustainability in Creative Industries年度引用
書(shū)目名稱(chēng)Sustainability in Creative Industries年度引用學(xué)科排名
書(shū)目名稱(chēng)Sustainability in Creative Industries讀者反饋
書(shū)目名稱(chēng)Sustainability in Creative Industries讀者反饋學(xué)科排名
作者: Acquired 時(shí)間: 2025-3-21 22:14 作者: AWL 時(shí)間: 2025-3-22 00:59
978-3-031-52728-9The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: INTER 時(shí)間: 2025-3-22 05:02
Sustainability in Creative Industries978-3-031-52726-5Series ISSN 2522-8714 Series E-ISSN 2522-8722 作者: conifer 時(shí)間: 2025-3-22 11:25
Design of Projects for Sustainability in the Industry“Sustainability in the Creative Industries” is a pivotal component of the prestigious Advances in Science, Technology and Innovation (ASTI) series. This collection of meticulously reviewed books aims to push the boundaries of research in science, technology, and innovation (ASTI).作者: intimate 時(shí)間: 2025-3-22 13:59 作者: 一再困擾 時(shí)間: 2025-3-22 20:52
Developing a Mobile Fashion Dictionary to Improve Understanding of English Vocabularies for Fashionon was feasible enough to be used by university students or public who want to learn fashion. In conclusion, the media can be used by fashion students at universities and public to understand English words or terms of fashion quickly.作者: MONY 時(shí)間: 2025-3-23 00:27 作者: Valves 時(shí)間: 2025-3-23 04:20 作者: NIL 時(shí)間: 2025-3-23 08:31
Applying Design Thinking Method to Fashion Upcycling Educational Campaignal media to reach and interact with this specific audience. For the implementation phase, a workshop for 15 high school students was held. Afterward, this study can learn from their choices and insights into the campaign design. The findings of this study, seven steps of design thinking, were applie作者: 傷心 時(shí)間: 2025-3-23 09:43
Finding Value: Exploring Local Resources for Sustainable Fashionical observation during the design process as data collection methods, (2) critical analysis of the project’s results, and (3) critical analysis feedback from the expert to support the recommendations. The investigations yielded four (4) design suggestions for designers, along with a corresponding p作者: 沙草紙 時(shí)間: 2025-3-23 15:53
Utilization of Pasuruan Regency Handloom Fabrication Silk for the Indonesian Sustainable Fashion Indst in Indonesia, where yarns are required for the handloom fabrication silk process by Pasuruan Regency-based MSMEs KaIND. The Handloom fabrication silk utilization promotes the distinctive textile into luxurious, wearable Indonesian sustainable fashion products with locally based natural dyes and I作者: 評(píng)論性 時(shí)間: 2025-3-23 19:07
Utilization of Vegetable Texture as an Alternative Tool for Printing Plates in Block Printing Technilization of this relief printing principle can not only be developed through various motif designs on block printing plates. However, it can also be developed by utilizing everyday objects with unique textures, such as vegetables. Vegetables in the form of leaves or fruits that we often consume dail作者: misshapen 時(shí)間: 2025-3-23 22:37 作者: RENAL 時(shí)間: 2025-3-24 05:54 作者: 五行打油詩(shī) 時(shí)間: 2025-3-24 08:44 作者: 一再煩擾 時(shí)間: 2025-3-24 13:28
Exploring Cultural Sustainability Through Contemporary Indonesian Fashion Brandserstanding in the fashion brands’ cultural sustainability practice. The result of the study indicated that the contemporary fashion brands respectfully implement traditional culture into the designs in various ways by adapting the cultural elements into contemporary techniques and design, shown thro作者: 清澈 時(shí)間: 2025-3-24 16:17 作者: 名字的誤用 時(shí)間: 2025-3-24 21:39 作者: 陳腐思想 時(shí)間: 2025-3-25 02:58 作者: Cabinet 時(shí)間: 2025-3-25 03:42
ease attack diversity. The framework is able to detect the presence of an attack with 92% accuracy for mixed or multiple attack sources, and further classify the type of perturbation with 78% accuracy keeping the false positive rate at 0%. Overall, this two-stage detection framework is a cost-effect作者: 油膏 時(shí)間: 2025-3-25 08:38 作者: 薄膜 時(shí)間: 2025-3-25 12:51 作者: 平靜生活 時(shí)間: 2025-3-25 16:38 作者: CODA 時(shí)間: 2025-3-25 23:38
Ciawita Atmadiratna Lautama,Enrico,Evan Raditya Pratomoent to the inverse function, when it is involved in a block cipher, it has enhanced properties at a better level compared to AES (for example, it has better algebraic and statistical criteria such as periodicity, algebraic complexity, strict avalanche, and distance to SAC) by preserving the same sec作者: 擺動(dòng) 時(shí)間: 2025-3-26 02:54 作者: Affectation 時(shí)間: 2025-3-26 07:45 作者: 虛度 時(shí)間: 2025-3-26 11:28 作者: FOIL 時(shí)間: 2025-3-26 12:45
Monica Hartanti,Berti Alia Bahaduri,Julia Rosalindin comparison with non-interference and other related notions is established. We further relate our notion to the early works of Fenton and Denning to highlight its succinctness in defining language-based security, and also with that of Boudol’s notion of secure information flow as a safety property作者: Camouflage 時(shí)間: 2025-3-26 20:20 作者: 疲勞 時(shí)間: 2025-3-26 21:15 作者: 虛弱的神經(jīng) 時(shí)間: 2025-3-27 04:19 作者: Dungeon 時(shí)間: 2025-3-27 05:39
Ahda Yunia Sekar Fardhanions occur in diverse fields including financial technology (FinTech), Smart Cities, Internet of Things (IoT), healthcare, governance, global trade and the telecommunication sector including the upcoming 5G technology. In this chapter, we provide a clear overview on the principle behind blockchain te作者: 游行 時(shí)間: 2025-3-27 11:08
Retno Purwanti Murdaningsih,Yunisa Fitri Andriani,Zita Nadiae level of water raises above a certain marked level called threshold level, the regulatory authorities issues an order to open the gutters so as to allow flow of excessive water into it. As a result, the level of the water decreases but on the contrary, people are unaware about the opened gutter. W作者: Insensate 時(shí)間: 2025-3-27 14:28
Elliati Djakaria,Isabella I. Andreas,Seriwati Gintingget access to all the features available in that group. This is done by asking many questions to the CR by the NM and GH. To overcome the malicious attack in the wireless medium the communication between CR and NM and also the communication between CR and GH are encrypted. Here Rijndael AES encrypti作者: Ambulatory 時(shí)間: 2025-3-27 18:04 作者: 壓碎 時(shí)間: 2025-3-28 00:21
Christabel Annora Paramita Parunglowing users to rate without the fear of retaliation. In this chapter, we describe privacy preserving reputation management in social networks and the associated challenges. In particular, we look at privacy preserving reputation management in decentralized social networks, where there is no central作者: 值得 時(shí)間: 2025-3-28 03:15
Olivia Gondoputrantolowing users to rate without the fear of retaliation. In this chapter, we describe privacy preserving reputation management in social networks and the associated challenges. In particular, we look at privacy preserving reputation management in decentralized social networks, where there is no central作者: nocturia 時(shí)間: 2025-3-28 10:16
line social networks, including: (1) keyword-based flagging; (2) sentiment analysis; (3) honeypots; (4) social network analysis; (5) facial recognition; and (6) view escalation. We show that the keyword-only flagging mechanism used by US Department of Homeland Security to detect terrorists is potent作者: fibula 時(shí)間: 2025-3-28 11:00 作者: 威脅你 時(shí)間: 2025-3-28 18:10 作者: 熔巖 時(shí)間: 2025-3-28 20:56 作者: GUEER 時(shí)間: 2025-3-29 02:11
. It is therefore important to secure all the devices in the connected architecture. A solution to this problem is presented in this paper where we provide a hardware framework, called Smart Monitor, that utilizes a set of sensors (digital or physical) placed on the chip alongside the security targe作者: 瑣事 時(shí)間: 2025-3-29 05:24 作者: nonplus 時(shí)間: 2025-3-29 09:07 作者: 平項(xiàng)山 時(shí)間: 2025-3-29 13:20
Ciawita Atmadiratna Lautama,Enrico,Evan Raditya Pratomos, or S-boxes, whose input and output are then both sequences of bits. A prominent example of a block cipher is the AES, or Rijndael, which contains an (8,?8)-function at its core. This paper presents a simple (but efficient) method for building S-boxes for AES with good cryptographic properties and作者: modest 時(shí)間: 2025-3-29 16:32
Siti Zahro,Didik Nurhadi,Novi I. Fanani,Setiawan B. Pratamad5 million online shoppers, 70% E-commerce transaction will be via mobile, and 50% travel transactions will be online in India [.]. Along with the growth of online services, the percentage of online crime is also increasing. Online services utilize internet protocols for functioning. TCP is the most 作者: 玩忽職守 時(shí)間: 2025-3-29 20:06
Mohd Zaimmudin Mohd Zain,Hanisa Hassan,Nor Sofiatul Akma Jamaludin infrastructure, thereby improving decision making based on the information received from its surroundings. However, for these applications to work correctly, information needs to be authenticated, verified and trustworthy. The most important messages in these networks are safety messages which are 作者: Overdose 時(shí)間: 2025-3-30 03:26
Yosepin Sri Ningsih,Dewi Isma Aryani of language-based security for general purpose programming languages. Such a notion must necessarily consider both implicit and explicit flows, and the need to provide labeled outputs. The notion must also embed access control and information-flow control considering that the program output is usua作者: 清醒 時(shí)間: 2025-3-30 06:14
Monica Hartanti,Berti Alia Bahaduri,Julia Rosalind of language-based security for general purpose programming languages. Such a notion must necessarily consider both implicit and explicit flows, and the need to provide labeled outputs. The notion must also embed access control and information-flow control considering that the program output is usua作者: 跟隨 時(shí)間: 2025-3-30 11:11 作者: CHOKE 時(shí)間: 2025-3-30 15:20 作者: 實(shí)現(xiàn) 時(shí)間: 2025-3-30 17:45
thoroughly verified and is calculated through a hash algorithm by all nodes in the networks to attain a consensus before being inserted in the corresponding block. It can be visualized as a chain of blocks holding permanent, reliable, authenticated, distributed and tamper-proof data. Often misled w作者: 鋼筆尖 時(shí)間: 2025-3-30 21:14
Ahda Yunia Sekar Fardhani thoroughly verified and is calculated through a hash algorithm by all nodes in the networks to attain a consensus before being inserted in the corresponding block. It can be visualized as a chain of blocks holding permanent, reliable, authenticated, distributed and tamper-proof data. Often misled w作者: 欺騙世家 時(shí)間: 2025-3-31 04:28
Retno Purwanti Murdaningsih,Yunisa Fitri Andriani,Zita Nadianing economic growth and affecting health of human beings. According to economics times published dated 14th Oct. 2019, 1900 deaths occurs in overall monsoon in India, including 382 in Mumbai. 46 people were reported as missing and overall 25 lacks people in 22 states got affected due to swamping mi作者: 群島 時(shí)間: 2025-3-31 05:16 作者: mechanical 時(shí)間: 2025-3-31 12:57 作者: 永久 時(shí)間: 2025-3-31 15:22
Christabel Annora Paramita Parung uses of reputation systems is on e-commerce web sites such as eBay.com and Amazon.com, which use reputation systems to root out fraudulent sellers. Reputation systems can also play an important role in social networks to enforce various security requirements. For example, a reputation system can he作者: capsule 時(shí)間: 2025-3-31 17:48
Olivia Gondoputranto uses of reputation systems is on e-commerce web sites such as eBay.com and Amazon.com, which use reputation systems to root out fraudulent sellers. Reputation systems can also play an important role in social networks to enforce various security requirements. For example, a reputation system can he作者: emission 時(shí)間: 2025-3-31 21:45