Results 41 to 50 of about 2,517,406 (276)
Aspects of Heat Supply Security Management Using Elements of Decision Theory
Security in heat supply systems plays an important role in social, technical and political terms. It includes three main components: energy security, security of heat supply, security of people.
Bożena Babiarz
doaj +1 more source
CRITICAL INFRASTRUCTURE SECURITY MANAGEMENT ANTI-DRONE SYSTEMS
The problem area outlined in the article is the existence and effectiveness of anti-drone systems used to protect the state's critical infrastructure (CI).
Grzegorz Pietrek
doaj +1 more source
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis +13 more
wiley +1 more source
Implementasi Management Network Security Pada Laboratorium Cisco Universitas Bina Darma [PDF]
The development of computer network technology as a medium for data communications to this increase. The need for the use of shared resources on the network both software and hardware has resulted in the emergence of a variety of network technology ...
Negara, E. S. (Edi)
core
SUPER: Towards the Use of Social Sensors for Security Assessments and Proactive Management of Emergencies [PDF]
Social media statistics during recent disasters (e.g. the 20 million tweets relating to 'Sandy' storm and the sharing of related photos in Instagram at a rate of 10/sec) suggest that the understanding and management of real-world events by civil ...
Kaltenbrunner, Andreas +6 more
core +1 more source
Introduction: the implementation of measures to improve the culture of patient safety in public and private institutions seems to require the development of epidemiological surveillance systems.
Mónica Trujillo-Hoyos +2 more
doaj +1 more source
Security Management Policies and Work Accidents
Research purpose. The aim of the research is to demonstrate the impacts of an absence of organizational policies and strategies in the field of work security on enterprise competitiveness.
Monteiro Nuno, Anunciação Pedro
doaj +1 more source
Threats to critical infrastructure. The case of unmanned aerial vehicles
Objectives The problem area noted by the author of this paper is the existence of threats to the critical infrastructure of the state, especially from rapidly developing "drone" technology. Material and methods The main objective of the research was the
Grzegorz Wojciech Pietrek
doaj +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique +2 more
core +1 more source

