Results 21 to 30 of about 2,472,718 (208)

Exposition of Measure Risk within Quality Norms by Solving the Problems of the Persons and Property Patronage

open access: yesCommunications, 2002
Qualitative norms at present being introduced into all sectors of management also enter successfully new sorts of managerial activities including safety management.
Marian Mesaros
doaj   +1 more source

Robust multi-fidelity design of a micro re-entry unmanned space vehicle [PDF]

open access: yes, 2011
This article addresses the preliminary robust design of a small-scale re-entry unmanned space vehicle by means of a hybrid optimization technique. The approach, developed in this article, closely couples an evolutionary multi-objective algorithm with a ...
Aupoix B.   +9 more
core   +1 more source

Integrated design of hybrid interstory-interbuilding multi-actuation schemes for vibration control of adjacent buildings under seismic excitations [PDF]

open access: yes, 2017
The design of vibration control systems for the seismic protection of closely adjacent buildings is a complex and challenging problem. In this paper, we consider distributed multi-actuation schemes that combine interbuilding linking elements and ...
Karimi, Hamid Reza   +3 more
core   +2 more sources

Virtual reality - support or security threat?

open access: yesJournal of Modern Science, 2019
Objectives The aim of the work is to prove whether the virtual reality is a support or a threat to security. Material and methods literature analysis Results Virtual reality is nowadays both support and a threat to the security of society and ...
Angelika Katarzyna Wilk
doaj   +1 more source

Conceptul de securitate criminologică în spațiul post-sovietic // Criminological security concept in post-soviet states

open access: yesAnalele Ştiinţifice ale Universităţii "Al.I. Cuza" din Iaşi. Ştiinţe Juridice, 2022
In this study, were analyzed scientific publications in the Republic of Moldova and the post-soviet states, where the problem of criminological security was addressed directly or tangentially.
Bujor Valeriu, Andrei Clașevici
doaj   +1 more source

Non-conviction based sanctions:the Court of Justice v. the European Court of Human Rights, who decides? [PDF]

open access: yes, 2011
Recovering the proceeds of crime has become an instrumental tool in the fight against transnational criminality. It is expounded frequently that this tool is fundamental because it removes the incentive and means to commit further criminal activity ...
Egan, Maureen
core   +3 more sources

THE LEGAL PROTECTION OF DATABASES [PDF]

open access: yesChallenges of the Knowledge Society, 2016
The databases are a part of our everyday life and we use them almost without noticing how many and how valuable they are. Without them, our life would be extremely difficult. Just as difficult as a life without computers.
Viorel ROŞ
doaj  

Tactical and technical characteristic of individual protection means using in radiation danger

open access: yesKazan medical journal, 1994
The protective material against radiation (beta-, gamma- and roentgen) obtained by means of mechanical filling of porous polimeric materials with water metal suspensions is developed. The filler content in the material and consequently, leaden equivalent quantity vary in the wide range (between 0,1 and 0,9 mm Pb) and are regulated in the process of ...
L. B. Zamirova   +4 more
openaire   +1 more source

Judicial Protection of Individuals in an Administrative Procedure by Means of Administrative Proceedings

open access: yesAdministrative law and procedure, 2021
The article highlights and studies judicial protection of individuals and organizations (individuals) in the administrative process as a special way of implementing justice on the appeals of citizens and their associations for the protection of their rights, freedoms, and legitimate interests in the course of Executive (non-judicial) and judicial ...
openaire   +1 more source

Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies

open access: yes, 2014
Privacy definitions provide ways for trading-off the privacy of individuals in a statistical database for the utility of downstream analysis of the data.
Ding, Bolin   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy