Results 21 to 30 of about 2,472,718 (208)
Qualitative norms at present being introduced into all sectors of management also enter successfully new sorts of managerial activities including safety management.
Marian Mesaros
doaj +1 more source
Robust multi-fidelity design of a micro re-entry unmanned space vehicle [PDF]
This article addresses the preliminary robust design of a small-scale re-entry unmanned space vehicle by means of a hybrid optimization technique. The approach, developed in this article, closely couples an evolutionary multi-objective algorithm with a ...
Aupoix B. +9 more
core +1 more source
Integrated design of hybrid interstory-interbuilding multi-actuation schemes for vibration control of adjacent buildings under seismic excitations [PDF]
The design of vibration control systems for the seismic protection of closely adjacent buildings is a complex and challenging problem. In this paper, we consider distributed multi-actuation schemes that combine interbuilding linking elements and ...
Karimi, Hamid Reza +3 more
core +2 more sources
Virtual reality - support or security threat?
Objectives The aim of the work is to prove whether the virtual reality is a support or a threat to security. Material and methods literature analysis Results Virtual reality is nowadays both support and a threat to the security of society and ...
Angelika Katarzyna Wilk
doaj +1 more source
In this study, were analyzed scientific publications in the Republic of Moldova and the post-soviet states, where the problem of criminological security was addressed directly or tangentially.
Bujor Valeriu, Andrei Clașevici
doaj +1 more source
Non-conviction based sanctions:the Court of Justice v. the European Court of Human Rights, who decides? [PDF]
Recovering the proceeds of crime has become an instrumental tool in the fight against transnational criminality. It is expounded frequently that this tool is fundamental because it removes the incentive and means to commit further criminal activity ...
Egan, Maureen
core +3 more sources
THE LEGAL PROTECTION OF DATABASES [PDF]
The databases are a part of our everyday life and we use them almost without noticing how many and how valuable they are. Without them, our life would be extremely difficult. Just as difficult as a life without computers.
Viorel ROŞ
doaj
Tactical and technical characteristic of individual protection means using in radiation danger
The protective material against radiation (beta-, gamma- and roentgen) obtained by means of mechanical filling of porous polimeric materials with water metal suspensions is developed. The filler content in the material and consequently, leaden equivalent quantity vary in the wide range (between 0,1 and 0,9 mm Pb) and are regulated in the process of ...
L. B. Zamirova +4 more
openaire +1 more source
The article highlights and studies judicial protection of individuals and organizations (individuals) in the administrative process as a special way of implementing justice on the appeals of citizens and their associations for the protection of their rights, freedoms, and legitimate interests in the course of Executive (non-judicial) and judicial ...
openaire +1 more source
Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies
Privacy definitions provide ways for trading-off the privacy of individuals in a statistical database for the utility of downstream analysis of the data.
Ding, Bolin +2 more
core +1 more source

