We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 91 results
  1. Enabling secure and efficient industry 4.0 transformation through trust-authorized anomaly detection in cloud environments with a hybrid AI approach

    The swift advancement of next-generation technologies for wireless communication has led to the cloud computing model becoming a more effective...

    N. Prakash, J. Vignesh, ... Balambigai Subramanian in Optical and Quantum Electronics
    Article 27 December 2023
  2. The MVM ventilator and 3D\(\pi \) PET scanner development arising from basic science work

    During the COVID-19 pandemic, members of the DarkSide-20k (DS) Dark Matter international experimental collaboration together with engineers,...

    Article 15 August 2022
  3. Standards and Best Practices

    Cyber resilience is an emerging and highly dynamic discipline that poses major challenges for many organizations. For effective design,...
    Simon Tjoa, Melisa Gafić, Peter Kieseberg in Cyber Resilience Fundamentals
    Chapter 2024
  4. Road to a Sustainable Human Reliability Program and Implementation Strategy

    The Human Reliability Program (HRP) is a security and safety reliability program designed to ensure that individuals who occupy positions affording...
    Chapter 2023
  5. Enhancing Cybersecurity in Industrial Control Systems Through GRC Framework: Principles, Regulations, and Risk Assessment

    Information security’s primary purpose is to safeguard confidentiality, integrity, and availability. Moreover, as a result of the current global...
    Conference paper 2024
  6. A Comparative Analysis of OIML Documents and Russian Rules on the Use of Reference Materials

    The article analyzes the compliance of Russian legal documents with the Recommendations of the International Organization of Legal Metrology...
    Narine G. Oganyan, Vladimir I. Dobrovolskiy in Reference Materials in Measurement and Technology
    Conference paper 2024
  7. Safety, Regulations, Metrology and Standards in Neutron Imaging

    This chapter deals with the safety, regulations and standards towards the implementation of neutron imaging activities in any neutron source. The...
    P. S. Sarkar in Neutron Imaging
    Chapter 2022
  8. Education and Training in MR-Based Radiation Treatment

    Magnetic resonance image (MR)-guided radiotherapy (MRgRT) is a modern treatment modality in radiation oncology. This system permits to exploit MR...
    Luca Nicosia, Riccardo Filippo Borgese, ... Filippo Alongi in A Practical Guide to MR-Linac
    Chapter 2024
  9. Legal Aspects of Network Security

    In this article, we will examine some of the international- EU- and Hungarian legal frameworks for network security, summarize them and outline...
    Levente Durczy, Kornélia Lazányi, ... András Molnár in Critical Infrastructure Protection in the Light of the Armed Conflicts
    Conference paper 2024
  10. Internet of Things (IoT) System Security Vulnerabilities and Its Mitigation

    The Internet is the most important technology created, like a fabric woven into each of our lives. Over the years the internet has evolved into the...
    Akshet Bharat Patel, Pranav Rajesh Sharma, Princy Randhawa in Security and Privacy in Cyberspace
    Chapter 2022
  11. Tends in Engineering Asset Management: The Impact of Transformative Technologies on Risk and Reliability Management

    The strategic focus of the modern-day managers has been on seeking transformative technological and business solutions to ensure the safe and...
    Chapter 2024
  12. Effective Management and Implementation of a PRA Project for a Safety Critical System

    A Probabilistic Risk Assessment project for safety critical system requires multi-disciplinary approach where apart from modeling and statistical...
    Conference paper 2023
  13. Obtaining Landing Licenses and Permission to Operate LEO Constellations on a Global Basis

    It is important to have a clear understanding of the system architecture and the business model of a satellite system before embarking on the...
    Tony Azzarelli in Handbook of Small Satellites
    Reference work entry 2020
  14. AstroSat proposal processing system

    AstroSat Proposal Processing System (APPS) is a mission critical software solution designed and developed by the joint efforts of Indian Space...

    C. Balamurugan, Sachin Narang, ... B. N. Ramakrishna in Journal of Astrophysics and Astronomy
    Article 31 May 2021
  15. Management (III): Quality Management and Risk Control

    A space science project is a space engineering project in the first place. The realization of its scientific objectives depends on the successful...
    Chapter 2021
  16. Oppenheimer Reviled

    In the immediate post-war years, Oppenheimer was a unique figure in America. He was, as Glauber put it, being lionized all the time. His picture was...
    José Ignacio Latorre, María Teresa Soto-Sanfiel in The Last Voice
    Chapter 2023
  17. Prospects and Challenges with Legal Informatics and Legal Metrology Framework in the Context of Industry 6.0

    Industry 6.0 is viewed as a futuristic industrial evolution. It aims to set the synergy between man and robot by providing the wealth affluence away...

    Shubhangi Chourasia, S. M. Pandey, Anup Kumar Keshri in MAPAN
    Article 25 May 2023
  18. Quantum based flexible secure authentication protocol (SAP) for device to device (D2D) communication

    Comprehensive inquisition of wireless communication with flexible quantum electronics and physics can be considered as one of the blooming...

    Payal Tayade, P. Vijaya Kumar in Optical and Quantum Electronics
    Article 30 June 2023
  19. Emergency Management System Application in Management of Terrorist Incidents

    Terrorism is a universal threat to the USA with risks from domestic, transnational, and “lone wolf” actors. While the ultimate goal is to prevent...
    Eric K. Griffin in Handbook of Security Science
    Reference work entry 2022
  20. Emergency Management System Application in Management of Terrorist Incidents

    Terrorism is a universal threat to the USA with risks from domestic, transnational, and “lone wolf” actors. While the ultimate goal is to prevent...
    Eric K. Griffin in Handbook of Security Science
    Living reference work entry 2022
Did you find what you were looking for? Share feedback.