We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 1,968 results
  1. Experiments

    The purpose of the experiment was to present the considered methodology of resource forecasting as well as to evaluate the nature of the change of...
    Chapter 2025
  2. Method

    The service life of similar products produced in significant quantities is determined using a mass, statistical model, when the behavior of a set of...
    Chapter 2025
  3. Discussion

    A summary of the results of monitoring processes leading to catastrophic developments in technology and nature is given in Tables 4.1, 4.2, 4.3, 4.4.
    Chapter 2025
  4. Introduction

    The purpose of monitoring is to control the current state of the monitored object and predict the moment it reaches its critical state, which could...
    Chapter 2025
  5. Monitoring Vibrations and Disturbances in Industry and Nature

    A catastrophic phenomenon should not be considered a sudden and causeless event, but as a process whose characteristics are continuously changing...

    Anton Panda, Volodymyr Nahornyi in Synthesis Lectures on Mechanical Engineering
    Book 2025
  6. Conclusion

    The statistics presented in the monograph for predicting catastrophic events and phenomena of various physical origins indicate the effectiveness of...
    Chapter 2025
  7. Applied Problems Solved by Information Technology and Software

    This book explores a dynamic landscape where cutting-edge technologies are revolutionizing various domains. This captivating book delves into the...

    Azman Ismail, Fatin Nur Zulkipli, ... Andreas Öchsner in SpringerBriefs in Applied Sciences and Technology
    Book 2024
  8. Critical Infrastructure Protection in the Light of the Armed Conflicts

    This book summarizes the latest findings in critical infrastructure protection and related research areas. Armed conflicts and wars are now closer to...

    Tünde Anna Kovács, Zoltán Nyikes, ... László Tóth in Advanced Sciences and Technologies for Security Applications
    Conference proceedings 2024
  9. Graphene-Bearing Polymer Composites Applications to Electromagnetic Interference Shielding and Flame-Retardant Materials

    This book explores recent developments in electrically conducting graphene-containing polymer composites for electromagnetic interference (EMI)...

    Suprakas Sinha Ray, Lesego Tabea Temane, Jonathan Tersur Orasugh in Springer Series in Materials Science
    Book 2024
  10. Next-Generation Cybersecurity AI, ML, and Blockchain

    This book highlights a comprehensive overview of the recent advancements and challenges in the field of cybersecurity with a focus on the integration...

    Keshav Kaushik, Ishu Sharma in Blockchain Technologies
    Book 2024
  11. Handbook on Radiation Environment, Volume 1 Sources, Applications and Policies

    This handbook provides a comprehensive review of radiation present in the environment, its sources, dose measurement techniques, exposures in natural...

    Dinesh Kumar Aswal
    Book 2024
  12. Introduction to Cybersecurity with AI, ML, and Blockchain

    This chapter provides an introduction of cybersecurity with the aim of combining Artificial Intelligence (AI), along with Machine Learning (ML), as...
    Krishna Chaitanya Nosina, T. Swarna Latha in Next-Generation Cybersecurity
    Chapter 2024
  13. Synergizing Artificial Intelligence and Blockchain

    This chapter provides a comprehensive examination of the confluence of Artificial Intelligence (AI) and Blockchain, which are two of the most notable...
    Priyanka Tyagi, Neelam Shrivastava, ... Vishal Jain in Next-Generation Cybersecurity
    Chapter 2024
  14. A Comprehensive Exploration of Advancements and Applications of Digital Watermarking

    The availability of multimedia content through digital networks is becoming more and more dependent on the internet in the current era of information...
    Ealuri Rohith, Buggaveeti Padmaja, V. M. Manikandan in Next-Generation Cybersecurity
    Chapter 2024
  15. Bridging the Gap Between Learning and Security: An Investigation of Blended Learning Systems and Ransomware Detection

    Blended learning has been identified as a potentially viable strategy for enhancing the efficacy and efficiency of online learning through the...
    Vikas Pandey, Aman Jolly, ... Shashikant in Next-Generation Cybersecurity
    Chapter 2024
  16. Liquid Scintillation Based In-Vitro Analysis of Various Radionuclides in Bioassay Samples

    The chapter reviews the literature on application of Liquid Scintillation Counting for in-vitro analysis of various α and β radionuclides in bioassay...
    Sonali P. D. Bhade, Priyanka J. Reddy in Handbook on Radiation Environment, Volume 2
    Chapter 2024
  17. Radiation Environment in Particle Accelerator Facilities

    Charged particle accelerators are very important tools for basic and applied research and various applications in industry and health care. In these...
    G. Haridas, R. Ravishankar, ... T. Palani Selvam in Handbook on Radiation Environment, Volume 2
    Chapter 2024
  18. Pulse Regime Airborne Millimeter Wave Synthetic Aperture Radar

    Wide swath and high resolution are the eternal pursuit of SAR, and they are also a pair of contradictory quantities.
    Chapter 2024
  19. AI and Blockchain for Secure Data Analytics

    In the age of big data and sophisticated analytics, organizations experience major barriers to ensuring the privacy, security, and dependability...
    Shweta Mayor Sabharwal, Sonia Chhabra, Manpreet Kaur Aiden in Next-Generation Cybersecurity
    Chapter 2024
  20. Continuous Wave Regime Airborne Millimeter Wave Synthetic Aperture Radar Technology

    The miniaturization of SAR system is an important development direction of SAR technology. The miniaturization of SAR system is to reduce the size,...
    Chapter 2024
Did you find what you were looking for? Share feedback.