Results 21 to 30 of about 285,701 (294)

Pitfall of the Detection Rate Optimized Bit Allocation within template protection and a remedy [PDF]

open access: yes, 2009
One of the requirements of a biometric template protection system is that the protected template ideally should not leak any information about the biometric sample or its derivatives. In the literature, several proposed template protection techniques are
Breebaart, J.   +4 more
core   +2 more sources

Status and prospect of microcomputer protection device for mine-used high-voltage explosion-proof switch

open access: yesGong-kuang zidonghua, 2018
Status of microcomputer protection device for mine-used high-voltage explosion-proof switch was introduced from aspects of hardware structure and basic functions.
LU Donggui, RONG Xiang, ZENG Ke
doaj   +1 more source

Intelligent electric control system design for mine horizontal directional drilling rig

open access: yesGong-kuang zidonghua, 2021
In order to solve the problems of low degree of intelligence, single function and poor safety of electric control system of domestic horizontal directional drilling rigs, an intelligent electric control system for mine horizontal directional drilling rig
LIU Zhu1   +4 more
doaj   +1 more source

Identification and Analysis of Accident Scenarios in the Hospital Central Oxygen Unit by Fault Tree Analysis Method and Evaluation of the Adequacy of Control Devices Using Layer of Protection Analysis [PDF]

open access: yesMuhandisī-i bihdāsht-i ḥirfah/ī, 2020
Background and Objective: Central oxygen is one of the vital parts of hospitals responsible for supplying oxygen. Therefore, any defect in this system can result in human and financial losses. Therefore, effective risk analysis is of utmost importance in
Maryam Feiz Arefi   +3 more
doaj   +3 more sources

Protecting Cryptographic Keys against Continual Leakage [PDF]

open access: yes, 2010
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys and computing on them in a manner that preserves security even when the adversary is able to obtain information leakage during the computation on the key.
Ali Juma, Yevgeniy Vahlis
openaire   +1 more source

The protective performance of reusable cloth face masks, disposable procedure masks, KN95 masks and N95 respirators: Filtration and total inward leakage.

open access: yesPLoS ONE, 2021
Face coverings are a key component of preventive health measure strategies to mitigate the spread of respiratory illnesses. In this study five groups of masks were investigated that are of particular relevance to the SARS-CoV-2 pandemic: re-usable ...
Scott Duncan, Paul Bodurtha, Syed Naqvi
doaj   +1 more source

Recharge characteristics and protection of karst groundwater in major leakage area of Yufu river in Jinan

open access: yesCarsologica Sinica, 2023
Jinan, called as "the city of thousands of springs", is famous for its large number of springs. The saying "the seventy-two famous springs in Jinan top those elsewhere" reflects a profound spring culture with a long history.
Qinghua GUAN   +4 more
doaj   +1 more source

Balancing climate change mitigation and environmental protection interests in the EU Directive on carbon capture and storage [PDF]

open access: yes, 2012
The EU Climate and Energy Package highlights the potential contradictions between the climate change imperative of reducing GHGs emissions and the importance to maintain environmental integrity. While the package supports climate change mainstreaming, it
Montini, Massimiliano, Orlando, Emanuela
core   +1 more source

Design of a new type of safety protection device for gas bottle cabinet [PDF]

open access: yesMATEC Web of Conferences, 2020
Aiming at the problem of explosion caused by leakage of flammable and explosive gas cylinder, a new type of safety protection device for gas bottle cabinet is designed to solve this problem.
Guo Lianghui, Jia Wenting
doaj   +1 more source

Differential Privacy: on the trade-off between Utility and Information Leakage [PDF]

open access: yes, 2011
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent ...
Alvim, Mário S.   +4 more
core   +6 more sources

Home - About - Disclaimer - Privacy