Showing 3,881 - 3,900 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3881

    Digital Twin Hospital Buildings: An Exemplary Case Study through Continuous Lifecycle Integration by Yang Peng, Ming Zhang, Fangqiang Yu, Jinglin Xu, Shang Gao

    Published 2020-01-01
    “…Hospital buildings usually contain sophisticated facility systems and special medical equipment, strict security requirements, and business systems. Traditional methods such as BIM are becoming less capable of real-time updates of building status and big data volume. …”
    Get full text
    Article
  2. 3882
  3. 3883

    Strategic priorities and challenges in research software funding: Results from an international survey [version 2; peer review: 2 approved, 1 approved with reservations, 1 not appr... by Daniel S. Katz, Eric A. Jensen

    Published 2025-01-01
    “…Results The survey revealed that funders place strong emphasis on developing skills, promoting software sustainability, embedding open science practices, building community and collaboration, advancing research software funding mechanisms, increasing software visibility and use, fostering innovation, and ensuring security. Conclusions The findings highlight opportunities to enhance research software’s role through increased funder attention on professional recognition for software contributions and the non-technical, social aspects of research software sustainability. …”
    Get full text
    Article
  4. 3884

    CAPITAL WITHOUT STATEHOOD: EMPIRICAL STUDIES IN STARAYA LADOGA, KASIMOV AND MYSHKIN by I. Y. Okunev, D. V. Basova

    Published 2016-08-01
    “…Two major territorial bases of stateness are traditionally singled out: nation-building and threats to security or, in other words, mental boundaries marking of "Us" community and actualization of "Others". …”
    Get full text
    Article
  5. 3885

    Detection of Jihadism in Social Networks Using Big Data Techniques Supported by Graphs and Fuzzy Clustering by Cristina Sánchez-Rebollo, Cristina Puente, Rafael Palacios, Claudia Piriz, Juan P. Fuentes, Javier Jarauta

    Published 2019-01-01
    “…Human resources departments can apply the power of profile identification to automatically classify candidates, security teams can detect undesirable clients in the financial or insurance sectors, and immigration officers can extract additional insights with these techniques.…”
    Get full text
    Article
  6. 3886

    Protection of constitutional values in the conditions of the Russian-Ukrainian war by Т. І. Gudz

    Published 2024-06-01
    “…A special role belongs to the judicial system, which must ensure a balance between national security and the rights and freedoms of citizens. International support is also critical to strengthening legal stability and protecting democratic values. …”
    Get full text
    Article
  7. 3887

    Victims’ profile by firearm related injuries in the municipality of the state of Rio de Janeiro by Graciele Oroski Paes, Simone Mendes Carvalho, Celso Alexandre Tavares Rodrigues, Joyce Maria dos Santos de Faria

    Published 2015-07-01
    “…The study contribution is anchored in orientation to preventive actions to the local population as well as to the elaboration of security public policies and awareness for the participation to combat and minimize the collaborative indexes of the local urban violence.…”
    Get full text
    Article
  8. 3888
  9. 3889

    Compressed Sensing-Based Order Analysis for Blade Tip Timing Signals Measured at Varying Rotational Speed by Suiyu Chen, Yongmin Yang, Haifeng Hu, Fengjiao Guan, Guoji Shen, Faming Yang

    Published 2020-01-01
    “…Monitoring the vibrations of high-speed rotating blades is significant to the security of turbomachineries. Blade tip timing (BTT) is considered as a promising technique for detecting blade vibrations without contact online. …”
    Get full text
    Article
  10. 3890

    Route Selection of Multimodal Transport Based on China Railway Transportation by Hui Zhang, Yao Li, Qingpeng Zhang, Dingjun Chen

    Published 2021-01-01
    “…The advantage of multimodal transport is that it can deliver the goods to their destination in a reasonable combination of transport modes while ensuring security and punctuality. Multimodal transportation can effectively reduce logistics costs, improve logistics efficiency, and reduce environmental pollution. …”
    Get full text
    Article
  11. 3891

    THE ALBANIAN FACTOR OF DESTABILIZATION OF THE WESTERN BALKANS: SCENARIO APPROACH by E. G. Ponomareva

    Published 2018-07-01
    “…Substantiation of the probability of the development and implementation of the scenario is given in four key parameters, including political, economic, military and cultural and religious spheres.Among the main actors of the scenario the author singles out the armed forces of Kosovo, Albanian paramilitary formations on the territory of western Macedonia, transnational corporations, private military companies, as well as the United States, Britain, Turkey and the Arab monarchies who support the project politically and financially.The article concludes that there is a need for an objective political assessment of the situation in the region, an analysis of security threats and risks of another round of destabilization of the Western Balkans. …”
    Get full text
    Article
  12. 3892

    Models for the Design and Operation of Digital Educational Environments by A. V. Solovov, A. A. Menshikova

    Published 2021-01-01
    “…It includes a marketing subsystem, a set of technical tools, various types of security and an organizational subsystem. The main functions of these subsystems and their various components have been identified.A didactic model of a typical complex of digital educational resources has been developed. …”
    Get full text
    Article
  13. 3893

    A Dynamic-Balancing Testing System Designed for Flexible Rotor by Shibo Zhao, Xingmin Ren, Yihao Liu, Kuan Lu, Chao Fu, Yongfeng Yang

    Published 2021-01-01
    “…The experiments prove the effectiveness of the testing system, while the testing system has advantages of convenient and intuitive operation, high balance efficiency, and security.…”
    Get full text
    Article
  14. 3894

    Virtual Node-Driven Cloud–Edge Collaborative Resource Scheduling for Surveillance with Visual Sensors by Xinyang Gu, Zhansheng Duan, Guangyuan Ye, Zhenjun Chang

    Published 2025-01-01
    “…For public security purposes, distributed surveillance systems are widely deployed in key areas. …”
    Get full text
    Article
  15. 3895

    Blockchain-based renewable energy certificate system in Indonesia by Indri Haryani, Indra Ardhanayudha Aditya, Almareta Harasti Nuraini, Sri Widiyanesti, Andry Alamsyah, Eva Nurhazizah, Muhammad Naufal Hakim, Tanti Ruwani, Mochamad Zaky Dwi Arli, Nadhif Ditertian Girawan

    Published 2025-02-01
    “…Results show that blockchain technology can revolutionize Indonesian REC market by improving security, traceability, and promote stakeholders' trust. …”
    Get full text
    Article
  16. 3896

    Kazakh Initiatives on Cooperation with European Union by R. S. Kurmanguzhin

    Published 2015-02-01
    “…The Strategy covered areas of cooperation such as regional integration, economic development, democratization, energy and security. In 2008 under the instructions of the President of Kazakhstan Ministry of Foreign Affairs in cooperation with other ministries developed a state programme "Path to Europe" for 2009 - 2011, which aided the priorities of cooperation between Kazakhstan and the European Union. …”
    Get full text
    Article
  17. 3897

    The Evolution of the NATO-Russia Relations by V. I. Batyuk

    Published 2020-11-01
    “…NATO’s eastward enlargement — combined with the firm position of the official Washington and Brussels on the unacceptability of Russia’s membership in the Alliance — meant a complete exclusion of Russia from the decision-making process on the European security. At the same time, for a variety of reasons, in the post-bipolar world the military-political dependence of the Western European subregion on Washington did not decrease, as many hoped, but, on the contrary, has increased, thus excluding for Moscow the very possibility to play on the contradictions between the United States and its European allies. …”
    Get full text
    Article
  18. 3898
  19. 3899
  20. 3900

    Prospects for the creation of national and supranational cryptocurrencies in the BRICS countries by O. M. Makhalina, V. N. Makhalina

    Published 2019-06-01
    “…Cryptocurrency is not recognized as a legal means of payment; in the BRICS countries there are no own, national cryptocurrencies, and only projects of future cryptocurrencies are developed, taking into account the features of the set goalsof economic development and management of cryptocurrency activities; the countries of the Association do not abandon the use of blockchain technology in the field of economy and Finance, as it ensures the openness and security of data storage, the creation of centralized exchanges, the exchange of goods and services; the BRICS countries should be interested in a gradual shift away from dollar dependence. …”
    Get full text
    Article