Results 31 to 40 of about 922,831 (255)

Computer Attacks and Their Impact on the Security of Servers with Linux Operating System of Local Government Entities

open access: yesESPOCH Congresses
This research aims to determine the incidence of computer attacks on servers with the Linux operating system of local government entities. The study is limited to the decentralized autonomous government (GAD) of the Ecuadorian Amazon. Initially, the most
Francisco Javier Aguilar Feijóo   +1 more
doaj   +1 more source

Estimating ToE Risk Level using CVSS [PDF]

open access: yes, 2009
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

Development of a generic focal spot measurement method suitable for bore‐type linacs

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose In linear accelerators, deviations in the x‐ray focal spot position significantly affect the accuracy of radiation therapy. However, as the focal spot position in bore‐type linac systems such as the Radixact system, cannot be assessed using conventional methods, a new evaluation method is required.
Hidetoshi Shimizu   +5 more
wiley   +1 more source

Securing library information system: Vulnerabilities and threats [PDF]

open access: yes, 2010
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin   +3 more
core  

Advancing Network Securing Strategies with Network Algorithms for Integrated Air Defense System (IADS) Missile Batteries [PDF]

open access: yesarXiv, 2023
Recently, the Integrated Air Defense System (IADS) has become vital for the defense system as the military defense system is vital for national security. Placing Integrated Air Defense System batteries among locations to protect locations assets is a crucial problem because optimal solutions are needed for interceptor missiles to intercept attacker ...
arxiv  

Mechanisms of De‐icing by Surface Rayleigh and Plate Lamb Acoustic Waves

open access: yesAdvanced Engineering Materials, EarlyView.
Ice accretion impacts daily life, renewable energy generation, maintenance, and security in industries and aeronautics. Acoustic waves (AW) are a promising method for ice removal, although de‐icing mechanisms require further investigation to optimize energy efficiency.
Shilpi Pandey   +15 more
wiley   +1 more source

Enhanced Fog Water Harvesting on Superhydrophobic Steel Meshes

open access: yesAdvanced Engineering Materials, EarlyView.
Fog harvesting using mesh designs offers a sustainable solution to water scarcity. This study highlights key considerations for fog harvesting research and develops a methodology for a standardized protocol reflecting fog characteristics and environmental conditions.
Pegah Sartipizadeh   +3 more
wiley   +1 more source

Software Protection [PDF]

open access: yes, 2011
A computer system's security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link ...
Atallah M   +3 more
core   +1 more source

IT Security Plan for Flight Simulation Program [PDF]

open access: yesInternational Journal of Computer Science, Engineering and Applications (IJCSEA),Vol.1, No.5, October 2011, 117-140, 2011
Information security is one of the most important aspects of technology, we cannot protect the best interests of our organizations' assets (be that personnel, data, or other resources), without ensuring that these assetsare protected to the best of their ability.
arxiv   +1 more source

On the Rigidity and Mechanical Behavior of Triply Periodic Minimal Surfaces‐Based Lattices: Insights from Extensive Experiments and Simulations

open access: yesAdvanced Engineering Materials, EarlyView.
This study examines the mechanical properties of triply periodic minimal surfaces (TPMS)‐based lattices, analyzing 36 architectures in elastic and plastic regimes. It evaluates the applicability of beam‐based scaling laws to TPMS lattices. Rigidity arises from the alignment of members with the load direction and solid regions preventing rotation.
Lucía Doyle   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy