Results 21 to 30 of about 2,319,668 (347)
Mathematical model for controlling CO2 concentration in greenhouses late in MATLAB [PDF]
The article is devoted to the development of an automated control system for irradiation facilities. The system will optimize the electricity cost for supplementary lighting plants in greenhouses without economic losses. A number of scientific researches
Ivliev Sergey N. +3 more
doaj +1 more source
Mobile integrated conditional access system [PDF]
This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current ...
Birch, N +4 more
core +1 more source
The article focuses on the personal characteristics of candidates for employment in higher education institutions. The presence of a number of features in a candidate, with high probability, determines their potential disloyalty to any employer in the ...
A. R. Alaverdov, T. P. Alaverdova
doaj +1 more source
Criminal law protection of critical infrastructure objects against subversive encroachments
The norms of domestic and foreign legislation, which establish a criminal law prohibition of encroachments on objects of critical importance for the economy, defense and life support of the population for subversive purposes, have been studied.
О. V. Shamsutdinov, D. S. Melnyk
doaj +1 more source
CYCLIC SYSTEM FOR TRAINING SPECIALISTS OF ECONOMIC SECURITY OF ENTERPRISES AND ORGANIZATIONS
It has been proved that the introduction of a cyclic system of professional training of specialists in economic security of enterprises and organizations contributes to increasing the efficiency of their functioning, competitiveness, financial and ...
M. N. Vlasenko +2 more
doaj +1 more source
Secure Service Orchestration [PDF]
We present a framework for designing and composing services in a secure manner. Services can enforce security policies locally, and can invoke other services in a "call-by-contract" fashion. This mechanism offers a significant set of opportunities, each driving secure ways to compose services.
M. BARTOLETTI +3 more
openaire +5 more sources
Constructing secure service compositions with patterns [PDF]
In service based applications, it is often necessary to construct compositions of services in order to provide required functionality in cases where this is not possible through the use of a single service.
Pino, L., Spanoudakis, G.
core +1 more source
Background Since the end of January 2020, the coronavirus (COVID-19) pandemic has been responsible for a global health crisis. In England a number of non-pharmaceutical interventions have been introduced throughout the pandemic, including guidelines on ...
Claire F. Ferraro +8 more
doaj +1 more source
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations." The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new technical approaches.
Carl Kesselman +9 more
openaire +3 more sources
Secure sessions for web services [PDF]
We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is rather inefficient; moreover, it is often ...
Ricardo Corin +3 more
openaire +5 more sources

