Showing 21 - 40 results of 78 for search '"Surfing"', query time: 0.05s Refine Results
  1. 21

    Trouver sa place au sein du monde. Quand l’océan accueille les corps meurtris : les expériences sensibles de handi surf by Anne-Sophie Sayeux

    Published 2025-01-01
    “… Cet article adopte un point de vue anthropologique pour explorer la place des individus affectés par des déficiences corporelles au sein de notre société, en s’appuyant sur une ethnographie du handi surf. En examinant ces dynamiques entre trois niveaux d’analyse : le corps, la nature et le monde, il vise à comprendre la transformation d’un corps meurtri « endormi » à un corps marin qui s’éveille à travers le contact avec la nature. …”
    Get full text
    Article
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26

    Spectacular Bodies: Los Angeles Beach Cultures and the Making of the “California Look” (1900s-1960s) by Elsa Devienne

    Published 2019-12-01
    Subjects: “…California; beach; bodies; Muscle Beach; Los Angeles; spectacle; surfing; bodybuilding; tanning; health; fitness; leisure; physique…”
    Get full text
    Article
  7. 27
  8. 28
  9. 29
  10. 30

    Water power / by Webster, Christine

    Published 2006
    Table of Contents: “…Studying waterpower -- Waterpower facts -- Currents and tides page -- Tidal power -- Water energy history -- The waterwheel -- Steam power page -- Water for electricity -- Water cycle -- Dam issues -- Storing power -- Hydropower -- Advantages and disadvantages of waterpower -- Other waterpower uses -- Surfing waterpower science -- Science in action, building a waterwheel -- What have you learned?…”
    View in OPAC
    Book
  11. 31

    Online risks and parental mediation in social media usage among kids: a quantitative study in Rawalpindi City by Enaam Youssef, Enaam Youssef, Enaam Youssef, Sana Ali, Sana Ali, Mahra Al Malek, Saqib Riaz

    Published 2025-01-01
    “…Data gathered from 346 respondents revealed that the respondents indicated high-level engagement in online media, mainly for surfing and instant messaging, with daily usage varying from 1 to 3 h and some exceeding five hours. …”
    Get full text
    Article
  12. 32

    RAP detection method based on AP fingerprint by Qing LI, Ayong YE, Zhiqiang YAO, Aimin CHEN

    Published 2018-05-01
    “…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
    Get full text
    Article
  13. 33

    Collaborative defending scheme against malicious Web pages based on social trust by Xin LIU, Chun-fu JIA, Guo-you LIU, Zhi-chao HU, Dong WANG

    Published 2012-12-01
    “…To deal with the threat of malicious Web pages,a distributed defending scheme against malicious Web pages based on social trust was proposed.Besides the malicious URL list from third-party professional organizations,the direct and indirect trust relations between friends in social network were used to obtain evaluations of Web pages.The experiences about Web surfing from a user’s friends were collected to result in synthetical evaluations on his computer.Each user cooperated with his friends,so that a defending system was formed on the overall perspective,which can improve the defending ability of the social network against malicious Web pages.The experiment results indicate that the visits of malicious Web pages under the scheme decrease obviously than the methods without social trust.…”
    Get full text
    Article
  14. 34

    Whatsapp Addiction Affecting Students at Politeknik Sultan Mizan Zainal Abidin by Noor Rulhanim Binti Mohamad Ariffin, Norhafiza Binti Idris

    Published 2018-11-01
    “…Nowadays, surfing the internet across virtual borders became a must to almost every layer of society.  …”
    Get full text
    Article
  15. 35

    Xylanase-Producing Microbes and Their Real-World Application by Milan Phuyal, Uttam Budhathoki, Durga Bista, Shailendra Shakya, Rajan Shrestha, Ashwinee Kumar Shrestha

    Published 2023-01-01
    “…For the accumulation of suitable data, article surfing was carried out using multiple search engines viz. …”
    Get full text
    Article
  16. 36

    Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device by Hyun-Woo Kim, Jun-Ho Kim, Jong Hyuk Park, Young-Sik Jeong

    Published 2014-01-01
    “…Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. …”
    Get full text
    Article
  17. 37

    INFORMATION CULTURE AND INFORMATION SAFETY OF SCHOOLCHILDREN by E. G. Belyakova, E. V. Zagvyazinskaya, A. I. Berezentseva

    Published 2017-10-01
    “…Considering the lack of external filters on the way of harmful information streams, it is actually necessary to develop information culture of schoolchildren, their abilities to sensibly and critically interpret the information on the Internet, and choice of adequate behaviour models surfing the Web. The aim of the present research is to analyze the state of informational safety of schoolchildren while using the Internet; gaining an understanding of the role of external restrictions and opportunities of intrapersonal filtration of the harmful Internet content depending on children age. …”
    Get full text
    Article
  18. 38

    The current problems of the digital reflection of social reality: rethinking scientific concepts by M. Kibakin, S. Grishaeva

    Published 2019-05-01
    “….); representation of the distorted virtual image for communications, hyperactivity in the appeal to various resources (“Internet surfing”) and also prevalence of motivators and estimated means – anonymous comments, “likes”, posts, reposts, symbolical encouragement and awards. …”
    Get full text
    Article
  19. 39

    Movement Competency Screens Can Be Reliable In Clinical Practice By A Single Rater Using The Composite Score by Kerry J. Mann, Nicholas O'Dwyer, Michaela R. Bruton, Stephen P. Bird, Suzi Edwards

    Published 2022-06-01
    “… # Results Fifty-one pre-elite youth athletes (15.0±1.6 years; *n*=33 athletics, *n*=10 BMX and *n*=8 surfing) were included in the study. Based on kappa score and percentage agreement, both inter- and intra-rater reliability were highly variable for individual movements but consistently high (>0.70) for the MCS composite score. …”
    Get full text
    Article
  20. 40

    Intellectualized forensic technique for Android pattern locks by Jiahao QIU, Weidong QIU, Yangde WANG, Yan ZHA, Yuming XIE, Yan LI

    Published 2022-02-01
    “…In the field of digital forensics, how to unlock mobile devices such as phones has always been an urgent problem to overcome.As a special kind of password, pattern lock is widely used in mobile phone screen unlock and software access authorization.Existing pattern lock cracking techniques have several non-negligible disadvantages, such as poor concealment, low practicability, non-intelligence and single application scenario.Two basic threat models were abstracted from shoulder surfing, surveillance camera, and real-time forensics, and a multi-scenario side channel attack on pattern locks was proposed.Based on the data of surveillance camera or manual video, intelligent vision recognition algorithms were adopted to identify, select and track the target device and biological key points in the video dynamically.Then, discrete tracking points were integrated by spatial mapping and pruning algorithm.The denoising algorithm was used to eliminate redundancy and optimize the trajectory.Through procedures above, the original trajectory was simplified into regular polylines defined by several key turning points.Finally, the simplified pattern was compared and matched with the rules of legal pattern locks to inference and retort its actual pattern.Possible candidates will be sorted in the output according to their confidences.Results show that in the surveillance camera scenario, where the device screen is always visible, the cracking success rate of our technique is 89% for 10 attempts and 99.3% for 20 attempts.In the face-to-face scenario, where the subject consciously blocks the screen and his drawing finger, the success rate was 82% after 10 attempts and 89.3% after 20 attempts.In the surveillance camera scenario, the increase of shooting horizontal distance can significantly decrease the cracking success rate.But this effect diminishes with the increase of the number of attempts.Results show that the cracking success rate of the complex password is always higher than that of the simple password during 20 attempts, which means a complex pattern lock cannot play a better protection role if the proposed technique is applied.Shooting angle deflection within 5° has little effect on the success rate of cracking.…”
    Get full text
    Article