Results 1 to 10 of about 2,411,901 (357)

CHALLENGES OF IMPLEMENTATION OF STATE SECURITY SERVICES [PDF]

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2014
In the process of managing the country, it is advisable to look at broader measures of public administration in the implementation of specific national security services implemented to ensure existential and behavioral needs of society. The specified directory for the process to ensure the challenges of national security, will allow public authorities ...
Marek Zbigniew KULISZ
doaj   +17 more sources

Security Services Using Blockchains: A State of the Art Survey [PDF]

open access: yesIEEE Communications Surveys & Tutorials, 2019
This article surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy, and access control list (ACL), data and resource provenance, and integrity assurance. All these services are critical for the current distributed applications, especially due to the large amount of data being ...
Tara Salman   +4 more
openaire   +6 more sources

Provision of Security Facilities and Security Personnel Service Delivery in Universities in Cross River State, Nigeria [PDF]

open access: goldInternational Education Studies, 2020
The study examined provision of security facilities and security personnel service delivery in Universities in Cross River State, Nigeria. Three research questions and one hypothesis guided the study. The ex-post facto design was adopted for the study.
Eno Etudor-Eyo   +2 more
openaire   +4 more sources

Renal PEComa in a young male: A case report and insights from the literature. [PDF]

open access: yesUrol Case Rep
Perivascular epithelioid cell tumors (PEComas) are rare mesenchymal neoplasms, commonly found in the uterus and retroperitoneum. Renal PEComas are exceedingly rare, often posing diagnostic challenges due to their resemblance to renal cell carcinoma (RCC)
Sholan R   +5 more
europepmc   +2 more sources

Mathematical model for controlling CO2 concentration in greenhouses late in MATLAB [PDF]

open access: yesMATEC Web of Conferences, 2019
The article is devoted to the development of an automated control system for irradiation facilities. The system will optimize the electricity cost for supplementary lighting plants in greenhouses without economic losses. A number of scientific researches
Ivliev Sergey N.   +3 more
doaj   +1 more source

Neural network identification of a nonlinear model of a high-pressure sodium lamp [PDF]

open access: yesMATEC Web of Conferences, 2020
The article is devoted to the identification of a high-pressure sodium lamp nonlinear model parameters based on neural network technologies. Identification was carried out using a dynamic neural network.
Semenov Anatolij D.   +2 more
doaj   +1 more source

Exploring best-matched embedding model and classifier for charging-pile fault diagnosis

open access: yesCybersecurity, 2023
The continuous increase of electric vehicles is being facilitating the large-scale distributed charging-pile deployment. It is crucial to guarantee normal operation of charging piles, resulting in the importance of diagnosing charging-pile faults.
Wen Wang   +9 more
doaj   +1 more source

Self-Training Enabled Efficient Classification Algorithm: An Application to Charging Pile Risk Assessment

open access: yesIEEE Access, 2022
With the continuous development of electric vehicles (EV), large-scale distributed charging piles have been deployed in the wild. Therefore, it is extremely essential to evaluate the risk state of EV charging piles efficiently and effectively. This paper
Wen Wang   +9 more
doaj   +1 more source

Mobile integrated conditional access system [PDF]

open access: yes, 2008
This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current ...
Birch, N   +4 more
core   +1 more source

Purging the Past: The Current State of Lustration Laws in the Former Communist Bloc [PDF]

open access: yes, 1996
Lustration laws are used in the nations of the former communist bloc to determine whether suspected individuals collaborated with the former state security service.
Ellis, Mark S.
core   +2 more sources

Home - About - Disclaimer - Privacy