Results 41 to 50 of about 153,284 (312)

Short‐Term Scheduling Optimization of a Single‐Pipeline Refining System With High Melting Point Crude Oil

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT In order to reflect the actual production situation more comprehensively and optimize the production cost, this paper solves the short‐term scheduling optimization problem for a single pipeline containing high melting point crude oil. Based on the refining plan given by the upper layer, a multi‐objective optimization model with high melting ...
Jing Yao   +5 more
wiley   +1 more source

КОНЦЕПТУАЛЬНИЙ ПІДХІД ДО ПОБУДОВИ СИСТЕМИ КІБЕРНЕТИЧНОЇ БЕЗПЕКИ СТАЦІОНАРНИХ ІНФОРМАЦІЙНО-ТЕЛЕКОМУНІКАЦІЙНИХ ВУЗЛІВ УКРАЇНИ НА ПРИНЦИПАХ МАСШТАБУВАННЯ ТА ДОПОВНЕННЯ

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
Авторами на основі існуючих ідей обґрунтовано концептуальний підхід до побудови системи кібернетичної безпеки стаціонарних інформаційно-телекомунікаційних вузлів України на принципах масштабування та доповнення.
Igor M. Kozubtsov   +3 more
doaj  

Soil contamination following an industrial accident : towards efficient investigations and assessment [PDF]

open access: yes, 2010
International audienceWhen an industrial accident occurs, e.g. the explosion or the fire of a chemical facility, soil investigations and subsequent risk mitigation generally need to be decided and performed rapidly.
Blancher, P.   +8 more
core   +1 more source

Departing from standard practices: Strategic application of value engineering in the anatomy laboratory to enhance formaldehyde extraction using high‐impact, low‐cost, and low‐maintenance solutions

open access: yesAnatomical Sciences Education, Volume 18, Issue 3, Page 241-253, March 2025.
Abstract This study describes the process of developing a high‐impact, low‐cost, and low‐maintenance air ventilation system for anatomy facilities. It employed the strategic application of Value Engineering (VE), assuring that the air ventilation system meets contemporary threshold limit values (TLVs) for formaldehyde in the working zone of dissection ...
Jürgen Russ, Niels Hammer
wiley   +1 more source

RELEVANCE OF IMPLEMENTATION AND USING SDN NETWORK

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2018
The article presents the dynamics of the development of telecommunication networks: ISDN → IP → ethernet, (convergence of telecommunication technologies).
Kateryna A. Yefanova   +2 more
doaj  

Operationalizing BioSSbD: A safe‐and‐sustainable‐by‐design framework for biorefineries

open access: yesBiofuels, Bioproducts and Biorefining, EarlyView.
Abstract Biorefineries are central to the transition toward a circular bioeconomy; however, their increasing scale and technological heterogeneity, and the integration of biological, chemical, and thermochemical processes introduce complex challenges related to safety, sustainability, and operational reliability. Existing Safe‐and‐Sustainable‐by‐Design
Fernando Ramonet
wiley   +1 more source

PECULIARITIES OF MODEL DEVELOPMENT FOR ESTIMATION OF EFFICIENCY OF NAVIGATION AND SHIP CONTROL SYSTEMS

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2018
The article is devoted to the analysis of the existing indicators of the effectiveness of navigation systems and vessel traffic management, which led to the conclusion that the probability of performing a task without emergency events is the most ...
Oleksiy V. Danick   +2 more
doaj  

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

THE STRATEGY FOR ENSURING THE CYBER SECURITY OF THE ARMED FORCES OF UKRAINE

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
The military security strategy of Ukraine cyberspace (hereinafter – the Strategy) is based on the results of the military-political situation analysis and forecasting, the defense sufficiency principles, high availability to defense, system defense ...
Oleksandr O. Chernonoh   +2 more
doaj  

Home - About - Disclaimer - Privacy