Results 81 to 90 of about 993,359 (292)
Objective. The purpose of this article is to identify ways to improve the security systems (SS) of critical facilities (CF) that are subject to the regulation of legislation on critical information infrastructure (CII).Method.
A. A. Gavrishev
doaj +1 more source
Influence of an Oxygen‐Free Atmosphere on Diamond‐Single‐Grain Scratching of Ti–6Al–4V
Single‐grain scratching of Ti–6Al–4V is investigated under controlled, oxygen‐free, and ambient atmospheres using a novel experimental setup with in situ high‐speed imaging. The approach enables direct observation of chip formation and adhesion under suppressed oxidation.
Berend Denkena +2 more
wiley +1 more source
Aspects of a Watermark Solution [PDF]
Although watermarking is a relatively new technology, there are many ways of applying it on an electronic data set with the purpose of ensuring copyright integrity and authenticity of the electronic data. But, bearing in mind the evolution of information
Crina RATIU +2 more
core
Bioinspired Shape‐Memory Hook Fasteners With Programmable Interlocking and Silent Release
Bioinspired hook fasteners made from epoxy shape‐memory polymers are shown to switch between strong, secure attachment and gentle, silent release when heated. By combining programmable geometry and material response, these adaptive fasteners outperform commercial systems in strength and noise control, enabling new solutions for robotics, medical ...
Maria I. Vallejo Ciro +3 more
wiley +1 more source
Формалізація процесів захисту інформації в інформаційно-обчислювальних системах [PDF]
Розглянуто підхід до формалізації процесів забезпечення безпеки інформації, що ґрунтується на використанні властивостей мереж Петрі і їх проблемно-орієнтованих розширень.We have considered the approach to the formalization of the processes aimed at ...
Ковбаса, Володимир +2 more
core
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana +2 more
wiley +1 more source
Risk Management for e-Business [PDF]
In the new Internet economy, risk management plays a critical role to protect the organization and its ability to perform their business mission, not just its IT assets. Risk management is the process of identifying risk, assessing risk, and taking steps
Floarea NASTASE, Pavel NASTASE
core
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner +9 more
wiley +1 more source
Understanding Linkages among Food Availability, Access, Consumption, and Nutrition in Africa: Empirical Findings and Issues from the Literature [PDF]
This paper starts with the unsurprising observations that (1) having enough food available at national and local levels is necessary but not sufficient for ensuring that households have adequate access to food; (2) having adequate household access to ...
Diskin, Patrick K.
core +1 more source
Питання інформаційної безпеки України на сучасному етапі [PDF]
Voytsihovskyi, A.V. (2015), “The matter of information security of Ukraine at the present stage” [“Pytannia informatsiinoi bezpeky Ukrainy na suchasnomu etapi”], Pravo i Bezpeka, No. 3, pp. 15–20.Войціховський, А. В.
ORCID: http://orcid.org/0000-0001-5629-8852 +2 more
core

