Results 111 to 120 of about 2,389,131 (303)
The effectiveness of business management in precarious economic conditions can decrease due to the lack of a well-established economic security system and relevant accounting information that is also an object of special protection.
О. PYLYPENKO
doaj
Spatially Tailorable Liquid Crystalline Elastomer Alignment During Digital Light Process 3D Printing
Here, we report the fabrication of 3D printable liquid crystalline elastomer (LCE) structures with spatially tailorable alignment domains within the same layer. This work addresses the long‐standing challenge of preparing complex 3D LCE architectures with patterned functional domains to achieve nonlinear deformations. Fabrication of multi‐domains in 3D
Adam Bischoff +8 more
wiley +1 more source
Networked Organizational Structure of Enterprise Information Security Management Based on Digital Transformation and Genetic Algorithm. [PDF]
Di Z, Liu Y, Li S.
europepmc +1 more source
The security implications of geoengineering:blame,imposed agreement and the security of critical infrastructure [PDF]
The prospect of solar geoengineering in response to climate change (on the basis of its supposedly significantly lower cost and/or more rapid impact on global temperature than carbon reduction strategies) raises a number of security concerns that have ...
Cairns, Rose, Nightingale, Paul
core
Switchable Supramolecular Adhesive by Tuning Interfacial Bonding and Modulus
The supramolecular adhesive (HyDiP) shows reversible adhesion and recyclability. In the dehydrated state, it is dense, stiff (E ≈445 MPa), transparent, and provides strong bonding with adhesion strengths up to 4.65 MPa. In the hydrated state, it becomes porous, soft (E ≈0.11 MPa), and detaches easily, enabling sustainable high‐strength applications ...
Rumin Fu +10 more
wiley +1 more source
EFFECTIVENESS ASSESSMENT METHODOLOGY OF INFORMATION SECURITY MANAGEMENT SYSTEM THROUGH THE SYSTEM RESPONSE TIME TO INFORMATION SECURITY INCIDENTS [PDF]
Quality assessment of information security management system is an important step for obtaining baseline data for analysis of the security system control effectiveness, and evaluating implementation of the specified information security requirements of
F. N. Shago
doaj
MAGTWIST: A compact magnetic rotary actuator, enabling smooth, stepless rotation, and on‐demand locking. Inspired by peristalsis, a soft polymer belt generates a traveling‐wave, enabling 270° rotation when heated. Cooling stiffens the belt, locking it in position and enabling it to withstand high loads.
Simon Frieler +3 more
wiley +1 more source
The Role of User Behaviour in Improving Cyber Security Management. [PDF]
Moustafa AA, Bello A, Maurushat A.
europepmc +1 more source
Solutions and Tools for Secure Communication in Wireless Sensor Networks [PDF]
Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of ...
TILOCA, MARCO
core

