Results 111 to 120 of about 2,389,131 (303)

Consolidating Management Accounting and Economic Security System in a Business Enterprise: A Conceptual Framework

open access: yesNaukovij Vìsnik Nacìonalʹnoï Akademìï Statistiki, Oblìku ta Auditu, 2021
The effectiveness of business management in precarious economic conditions can decrease due to the lack of a well-established economic security system and relevant accounting information that is also an object of special protection.
О. PYLYPENKO
doaj  

Spatially Tailorable Liquid Crystalline Elastomer Alignment During Digital Light Process 3D Printing

open access: yesAdvanced Functional Materials, EarlyView.
Here, we report the fabrication of 3D printable liquid crystalline elastomer (LCE) structures with spatially tailorable alignment domains within the same layer. This work addresses the long‐standing challenge of preparing complex 3D LCE architectures with patterned functional domains to achieve nonlinear deformations. Fabrication of multi‐domains in 3D
Adam Bischoff   +8 more
wiley   +1 more source

The security implications of geoengineering:blame,imposed agreement and the security of critical infrastructure [PDF]

open access: yes, 2014
The prospect of solar geoengineering in response to climate change (on the basis of its supposedly significantly lower cost and/or more rapid impact on global temperature than carbon reduction strategies) raises a number of security concerns that have ...
Cairns, Rose, Nightingale, Paul
core  

Switchable Supramolecular Adhesive by Tuning Interfacial Bonding and Modulus

open access: yesAdvanced Functional Materials, EarlyView.
The supramolecular adhesive (HyDiP) shows reversible adhesion and recyclability. In the dehydrated state, it is dense, stiff (E ≈445 MPa), transparent, and provides strong bonding with adhesion strengths up to 4.65 MPa. In the hydrated state, it becomes porous, soft (E ≈0.11 MPa), and detaches easily, enabling sustainable high‐strength applications ...
Rumin Fu   +10 more
wiley   +1 more source

EFFECTIVENESS ASSESSMENT METHODOLOGY OF INFORMATION SECURITY MANAGEMENT SYSTEM THROUGH THE SYSTEM RESPONSE TIME TO INFORMATION SECURITY INCIDENTS [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2014
Quality assessment of information security management system is an important step for obtaining baseline data for analysis of the security system control effectiveness, and evaluating implementation of the specified information security requirements of
F. N. Shago
doaj  

MAGTWIST: A Magnetically‐Driven Rotary Actuator Using a Traveling‐Wave With Integrated Stiffness Tunability

open access: yesAdvanced Functional Materials, EarlyView.
MAGTWIST: A compact magnetic rotary actuator, enabling smooth, stepless rotation, and on‐demand locking. Inspired by peristalsis, a soft polymer belt generates a traveling‐wave, enabling 270° rotation when heated. Cooling stiffens the belt, locking it in position and enabling it to withstand high loads.
Simon Frieler   +3 more
wiley   +1 more source

The Role of User Behaviour in Improving Cyber Security Management. [PDF]

open access: yesFront Psychol, 2021
Moustafa AA, Bello A, Maurushat A.
europepmc   +1 more source

Solutions and Tools for Secure Communication in Wireless Sensor Networks [PDF]

open access: yes, 2013
Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of ...
TILOCA, MARCO
core  

Home - About - Disclaimer - Privacy