Results 41 to 50 of about 2,517,406 (276)

Aspects of Heat Supply Security Management Using Elements of Decision Theory

open access: yesEnergies, 2018
Security in heat supply systems plays an important role in social, technical and political terms. It includes three main components: energy security, security of heat supply, security of people.
Bożena Babiarz
doaj   +1 more source

CRITICAL INFRASTRUCTURE SECURITY MANAGEMENT ANTI-DRONE SYSTEMS

open access: yesWiedza Obronna, 2022
The problem area outlined in the article is the existence and effectiveness of anti-drone systems used to protect the state's critical infrastructure (CI).
Grzegorz Pietrek
doaj   +1 more source

Stereotactic Body Radiation Therapy for Pediatric, Adolescent, and Young Adult Patients With Osteosarcoma: Local Control Outcomes With Dosimetric Analysis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis   +13 more
wiley   +1 more source

Implementasi Management Network Security Pada Laboratorium Cisco Universitas Bina Darma [PDF]

open access: yes, 2014
The development of computer network technology as a medium for data communications to this increase. The need for the use of shared resources on the network both software and hardware has resulted in the emergence of a variety of network technology ...
Negara, E. S. (Edi)
core  

SUPER: Towards the Use of Social Sensors for Security Assessments and Proactive Management of Emergencies [PDF]

open access: yes, 2015
Social media statistics during recent disasters (e.g. the 20 million tweets relating to 'Sandy' storm and the sharing of related photos in Instagram at a rate of 10/sec) suggest that the understanding and management of real-world events by civil ...
Kaltenbrunner, Andreas   +6 more
core   +1 more source

Characterization of unsafe acts in dentistry (UAD) in a teaching-service institution, Medellín (Colombia), 2015-2017

open access: yesRevista Facultad de Odontología Universidad de Antioquia, 2018
Introduction: the implementation of measures to improve the culture of patient safety in public and private institutions seems to require the development of epidemiological surveillance systems.
Mónica Trujillo-Hoyos   +2 more
doaj   +1 more source

Security Management Policies and Work Accidents

open access: yesEconomics and Culture, 2022
Research purpose. The aim of the research is to demonstrate the impacts of an absence of organizational policies and strategies in the field of work security on enterprise competitiveness.
Monteiro Nuno, Anunciação Pedro
doaj   +1 more source

Threats to critical infrastructure. The case of unmanned aerial vehicles

open access: yesJournal of Modern Science, 2022
Objectives The problem area noted by the author of this paper is the existence of threats to the critical infrastructure of the state, especially from rapidly developing "drone" technology. Material and methods The main objective of the research was the
Grzegorz Wojciech Pietrek
doaj   +1 more source

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]

open access: yes, 2018
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy