Results 21 to 30 of about 2,319,668 (347)

Mathematical model for controlling CO2 concentration in greenhouses late in MATLAB [PDF]

open access: yesMATEC Web of Conferences, 2019
The article is devoted to the development of an automated control system for irradiation facilities. The system will optimize the electricity cost for supplementary lighting plants in greenhouses without economic losses. A number of scientific researches
Ivliev Sergey N.   +3 more
doaj   +1 more source

Mobile integrated conditional access system [PDF]

open access: yes, 2008
This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current ...
Birch, N   +4 more
core   +1 more source

Selection of Candidates for Positions in Higher Education Institution from the Standpoint of Their Potential Loyalty to Employer

open access: yesВысшее образование в России, 2020
The article focuses on the personal characteristics of candidates for employment in higher education institutions. The presence of a number of features in a candidate, with high probability, determines their potential disloyalty to any employer in the ...
A. R. Alaverdov, T. P. Alaverdova
doaj   +1 more source

Criminal law protection of critical infrastructure objects against subversive encroachments

open access: yesBulletin of Kharkiv National University of Internal Affairs, 2022
The norms of domestic and foreign legislation, which establish a criminal law prohibition of encroachments on objects of critical importance for the economy, defense and life support of the population for subversive purposes, have been studied.
О. V. Shamsutdinov, D. S. Melnyk
doaj   +1 more source

CYCLIC SYSTEM FOR TRAINING SPECIALISTS OF ECONOMIC SECURITY OF ENTERPRISES AND ORGANIZATIONS

open access: yesВестник университета, 2020
It has been proved that the introduction of a cyclic system of professional training of specialists in economic security of enterprises and organizations contributes to increasing the efficiency of their functioning, competitiveness, financial and ...
M. N. Vlasenko   +2 more
doaj   +1 more source

Secure Service Orchestration [PDF]

open access: yes, 2007
We present a framework for designing and composing services in a secure manner. Services can enforce security policies locally, and can invoke other services in a "call-by-contract" fashion. This mechanism offers a significant set of opportunities, each driving secure ways to compose services.
M. BARTOLETTI   +3 more
openaire   +5 more sources

Constructing secure service compositions with patterns [PDF]

open access: yes, 2012
In service based applications, it is often necessary to construct compositions of services in order to provide required functionality in cases where this is not possible through the use of a single service.
Pino, L., Spanoudakis, G.
core   +1 more source

Describing the indirect impact of COVID-19 on healthcare utilisation using syndromic surveillance systems

open access: yesBMC Public Health, 2021
Background Since the end of January 2020, the coronavirus (COVID-19) pandemic has been responsible for a global health crisis. In England a number of non-pharmaceutical interventions have been introduced throughout the pandemic, including guidelines on ...
Claire F. Ferraro   +8 more
doaj   +1 more source

Security for Grid services

open access: yesHigh Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on, 2004
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations." The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new technical approaches.
Carl Kesselman   +9 more
openaire   +3 more sources

Secure sessions for web services [PDF]

open access: yesProceedings of the 2004 workshop on Secure web service - SWS '04, 2004
We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is rather inefficient; moreover, it is often ...
Ricardo Corin   +3 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy