標題: Titlebook: Visual Securitization; Humanitarian Represe Alice Massari Book‘‘‘‘‘‘‘‘ 2021 The Editor(s) (if applicable) and The Author(s) 2021 Visual sec [打印本頁] 作者: CHAFF 時間: 2025-3-21 16:23
書目名稱Visual Securitization影響因子(影響力)
書目名稱Visual Securitization影響因子(影響力)學科排名
書目名稱Visual Securitization網絡公開度
書目名稱Visual Securitization網絡公開度學科排名
書目名稱Visual Securitization被引頻次
書目名稱Visual Securitization被引頻次學科排名
書目名稱Visual Securitization年度引用
書目名稱Visual Securitization年度引用學科排名
書目名稱Visual Securitization讀者反饋
書目名稱Visual Securitization讀者反饋學科排名
作者: 考古學 時間: 2025-3-21 20:23 作者: 團結 時間: 2025-3-22 03:23 作者: 樹木心 時間: 2025-3-22 07:10 作者: 拖債 時間: 2025-3-22 11:34 作者: 致命 時間: 2025-3-22 15:59 作者: 平息 時間: 2025-3-22 17:06
scheme, to encrypt PHRs, which reduces the repetitive computation and storage overhead. The proposed scheme adds the function of offline/online encryption, which can greatly save the energy consumption of the sensors in the WBANs. In addition, this scheme can provide attribute-level user revocation作者: Adulterate 時間: 2025-3-22 22:04
Alice Massarind a user-level attack tries to focus on a specific victim. We conduct extensive experiments to evaluate the effectiveness of our proposed two types of membership inference attacks on two benchmark datasets. The experimental results have shown that both class-level and user-level attacks can achieve作者: 綠州 時間: 2025-3-23 04:53 作者: jet-lag 時間: 2025-3-23 06:23 作者: 獨白 時間: 2025-3-23 10:35 作者: ENDOW 時間: 2025-3-23 17:11 作者: curriculum 時間: 2025-3-23 20:03 作者: CLAP 時間: 2025-3-24 01:29 作者: 懸崖 時間: 2025-3-24 03:37
2364-4087 o produce alternative discourses on refugees and displacement beyond the mainstream securitized ones. By showing how relief organizations’ visual representation contributes to978-3-030-71145-0978-3-030-71143-6Series ISSN 2364-4087 Series E-ISSN 2364-4095 作者: 違反 時間: 2025-3-24 10:13
tion. It is the cornerstone for imparting security and privacy into Blockchain and its efficiency of calculation decides the performance of Blockchain. In this paper, we propose two novel methods to accelerate the calculation of SHA-256 in different situations. To eliminate the useless operations, w作者: scotoma 時間: 2025-3-24 14:41 作者: Halfhearted 時間: 2025-3-24 17:04
hich makes mobile health become a promising field. PHRs are collected from wireless body area networks (WBANs) and will be shared with people in different fields through public channels, increasing the risk of leaking personal privacy. Ciphertext-policy attribute-based encryption (CP-ABE) is a popul作者: Prognosis 時間: 2025-3-24 20:02 作者: 反省 時間: 2025-3-25 02:53 作者: 去世 時間: 2025-3-25 06:18
rious types of vulnerabilities that can affect their security and functionality. In this paper, we present ., a novel framework that leverages a pre-trained identifier-aware encoder-decoder CodeT5 model and confident learning to detect seven types of vulnerabilities in Ethereum smart contracts. Conf作者: Inferior 時間: 2025-3-25 10:41
Alice Massari This paper proposes an information encryption mechanism based on QR code to solve the problem of information leakage in data communication. The error correction mechanism of the QR code allows it to record information normally even if it is partially damaged. Taking advantage of this feature, this 作者: 施加 時間: 2025-3-25 12:26
Alice Massari due to the immutable and irreversible features, vulnerable smart contracts which have been deployed in the the blockchain can only be detected rather than fixed. Conventional approaches heavily rely on hand-crafted vulnerability rules, which is time-consuming and difficult to cover all the cases. R作者: prick-test 時間: 2025-3-25 16:07 作者: Felicitous 時間: 2025-3-25 21:29
Alice Massari and mobile networks, promoting the fusion of human society, information space, and the physical world and the development of the human-cyber-physical (HCP) environment. In the HCP environment, applications usually need to use heterogeneous resources belonging to multiple systems and participants. T作者: NOT 時間: 2025-3-26 02:35
2364-4087 s and free to read online.This open access book offers an innovative account of how relief organizations’ visual depiction of Syrian displacement contributes to reproduce and reinforce a securitized account of refugees. Through visual analysis, the book demonstrates how the securitization process ta作者: magenta 時間: 2025-3-26 07:57
A Visual Approachcertain economy of discourses of truth which operates through and on the basis of this association. We are subjected to the production of truth through power and we cannot exercise power except through the production of truth (Foucault 1980, 93).作者: aggravate 時間: 2025-3-26 08:41
Threatened, the Refugee as the Referent Objectes that humanitarianism has undergone over the last quarter century and how new relief assistance’ modalities, while seeking to putting individuals and their rights center stage have also primarily represented them in terms of victimhood.作者: 聯合 時間: 2025-3-26 12:42 作者: Immortal 時間: 2025-3-26 17:37
Introduction,retrospective by Khaled Hourani, a Palestinian artist reflecting on the reduction of refugees to abstract symbols of victimhood by humanitarian representations. In the eyes of the artist, the blue figure (Fig. 1.1), so common in relief organizations′ visual depictions, is the migrating human being, 作者: 戰(zhàn)役 時間: 2025-3-27 00:13
Humanitarianism, Securitization and Humanitarian Communicationsual production, to the securitization of the refugee issue, it is important to introduce the notions of humanitarianism, global governance, and securitization. Also, since NGOs do not operate in a vacuum but within a highly competitive media environment, it is equally important to reflect on the wa作者: 自制 時間: 2025-3-27 04:22 作者: 放縱 時間: 2025-3-27 06:26
Humanitarian NGOs and Global Governance: One, No One and One Hundred Thousand Humanitarian NGOstant reflect upon the aspirations of emergency organizations. How do relief agencies intend, perceive and present their role to the public? Are they interested in participating or influencing global governance? Do they consider their role as promoters of universal values or technical agents performi作者: 喊叫 時間: 2025-3-27 11:35
Threatening – The Refugee as a Threatnaged and controlled, migrants pointed at with generic allegation of terrorist threat, and state borders closed and militarized. Securitization of migration may not be a new phenomenon (Saunders 2014) but it is one that has recently received a great deal of attention (see among others Bigo 2002; Pug作者: Ceremony 時間: 2025-3-27 15:53 作者: fructose 時間: 2025-3-27 18:57 作者: 事情 時間: 2025-3-27 22:22
Conclusionidelines with fieldwork and interviews with NGO staffers – has shown the different ways in which each organization works. Exploration of the different sectors of intervention has highlighted the different roles NGOs want to have not only in the lives of their beneficiaries but more generally in the 作者: ERUPT 時間: 2025-3-28 03:12 作者: defenses 時間: 2025-3-28 09:47
Humanitarianism, Securitization and Humanitarian Communicationys in which humanitarian ideals are translated into their communication strategies and how these fit within the larger communication landscape. This chapter presents the literature and the theoretical framework on which this book is based.作者: 出血 時間: 2025-3-28 11:11
The (In)Visibility of Migrantsirms that photography makes things represented worth being seen, we may be led to think that, on the contrary, what is not photographed is not worth seeing. On this arbitrary decision over presence and absence, visibility and invisibility, hinges a very important dimension of the power of photography.作者: 抑制 時間: 2025-3-28 16:41
978-3-030-71145-0The Editor(s) (if applicable) and The Author(s) 2021作者: Lasting 時間: 2025-3-28 22:17
Visual Securitization978-3-030-71143-6Series ISSN 2364-4087 Series E-ISSN 2364-4095