Results 31 to 40 of about 922,831 (255)
This research aims to determine the incidence of computer attacks on servers with the Linux operating system of local government entities. The study is limited to the decentralized autonomous government (GAD) of the Ecuadorian Amazon. Initially, the most
Francisco Javier Aguilar Feijóo+1 more
doaj +1 more source
Estimating ToE Risk Level using CVSS [PDF]
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal+1 more
core +3 more sources
Development of a generic focal spot measurement method suitable for bore‐type linacs
Abstract Purpose In linear accelerators, deviations in the x‐ray focal spot position significantly affect the accuracy of radiation therapy. However, as the focal spot position in bore‐type linac systems such as the Radixact system, cannot be assessed using conventional methods, a new evaluation method is required.
Hidetoshi Shimizu+5 more
wiley +1 more source
Securing library information system: Vulnerabilities and threats [PDF]
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin+3 more
core
Advancing Network Securing Strategies with Network Algorithms for Integrated Air Defense System (IADS) Missile Batteries [PDF]
Recently, the Integrated Air Defense System (IADS) has become vital for the defense system as the military defense system is vital for national security. Placing Integrated Air Defense System batteries among locations to protect locations assets is a crucial problem because optimal solutions are needed for interceptor missiles to intercept attacker ...
arxiv
Mechanisms of De‐icing by Surface Rayleigh and Plate Lamb Acoustic Waves
Ice accretion impacts daily life, renewable energy generation, maintenance, and security in industries and aeronautics. Acoustic waves (AW) are a promising method for ice removal, although de‐icing mechanisms require further investigation to optimize energy efficiency.
Shilpi Pandey+15 more
wiley +1 more source
Enhanced Fog Water Harvesting on Superhydrophobic Steel Meshes
Fog harvesting using mesh designs offers a sustainable solution to water scarcity. This study highlights key considerations for fog harvesting research and develops a methodology for a standardized protocol reflecting fog characteristics and environmental conditions.
Pegah Sartipizadeh+3 more
wiley +1 more source
A computer system's security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link ...
Atallah M+3 more
core +1 more source
IT Security Plan for Flight Simulation Program [PDF]
Information security is one of the most important aspects of technology, we cannot protect the best interests of our organizations' assets (be that personnel, data, or other resources), without ensuring that these assetsare protected to the best of their ability.
arxiv +1 more source
This study examines the mechanical properties of triply periodic minimal surfaces (TPMS)‐based lattices, analyzing 36 architectures in elastic and plastic regimes. It evaluates the applicability of beam‐based scaling laws to TPMS lattices. Rigidity arises from the alignment of members with the load direction and solid regions preventing rotation.
Lucía Doyle+2 more
wiley +1 more source