Results 81 to 90 of about 993,359 (292)

On the issue of improving the security systems of critical facilities as objects of critical information infrastructure

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The purpose of this article is to identify ways to improve the security systems (SS) of critical facilities (CF) that are subject to the regulation of legislation on critical information infrastructure (CII).Method.
A. A. Gavrishev
doaj   +1 more source

Influence of an Oxygen‐Free Atmosphere on Diamond‐Single‐Grain Scratching of Ti–6Al–4V

open access: yesAdvanced Engineering Materials, EarlyView.
Single‐grain scratching of Ti–6Al–4V is investigated under controlled, oxygen‐free, and ambient atmospheres using a novel experimental setup with in situ high‐speed imaging. The approach enables direct observation of chip formation and adhesion under suppressed oxidation.
Berend Denkena   +2 more
wiley   +1 more source

Aspects of a Watermark Solution [PDF]

open access: yes
Although watermarking is a relatively new technology, there are many ways of applying it on an electronic data set with the purpose of ensuring copyright integrity and authenticity of the electronic data. But, bearing in mind the evolution of information
Crina RATIU   +2 more
core  

Bioinspired Shape‐Memory Hook Fasteners With Programmable Interlocking and Silent Release

open access: yesAdvanced Engineering Materials, EarlyView.
Bioinspired hook fasteners made from epoxy shape‐memory polymers are shown to switch between strong, secure attachment and gentle, silent release when heated. By combining programmable geometry and material response, these adaptive fasteners outperform commercial systems in strength and noise control, enabling new solutions for robotics, medical ...
Maria I. Vallejo Ciro   +3 more
wiley   +1 more source

Формалізація процесів захисту інформації в інформаційно-обчислювальних системах [PDF]

open access: yes, 2003
Розглянуто підхід до формалізації процесів забезпечення безпеки інформації, що ґрунтується на використанні властивостей мереж Петрі і їх проблемно-орієнтованих розширень.We have considered the approach to the formalization of the processes aimed at ...
Ковбаса, Володимир   +2 more
core  

3D (Bio) Printing Combined Fiber Fabrication Methods for Tissue Engineering Applications: Possibilities and Limitations

open access: yesAdvanced Functional Materials, EarlyView.
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana   +2 more
wiley   +1 more source

Risk Management for e-Business [PDF]

open access: yes
In the new Internet economy, risk management plays a critical role to protect the organization and its ability to perform their business mission, not just its IT assets. Risk management is the process of identifying risk, assessing risk, and taking steps
Floarea NASTASE, Pavel NASTASE
core  

NanoMOF‐Based Multilevel Anti‐Counterfeiting by a Combination of Visible and Invisible Photoluminescence and Conductivity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner   +9 more
wiley   +1 more source

Understanding Linkages among Food Availability, Access, Consumption, and Nutrition in Africa: Empirical Findings and Issues from the Literature [PDF]

open access: yes
This paper starts with the unsurprising observations that (1) having enough food available at national and local levels is necessary but not sufficient for ensuring that households have adequate access to food; (2) having adequate household access to ...
Diskin, Patrick K.
core   +1 more source

Питання інформаційної безпеки України на сучасному етапі [PDF]

open access: yes, 2015
Voytsihovskyi, A.V. (2015), “The matter of information security of Ukraine at the present stage” [“Pytannia informatsiinoi bezpeky Ukrainy na suchasnomu etapi”], Pravo i Bezpeka, No. 3, pp. 15–20.Войціховський, А. В.
ORCID: http://orcid.org/0000-0001-5629-8852   +2 more
core  

Home - About - Disclaimer - Privacy