Search
Search Results
-
Enabling secure and efficient industry 4.0 transformation through trust-authorized anomaly detection in cloud environments with a hybrid AI approach
The swift advancement of next-generation technologies for wireless communication has led to the cloud computing model becoming a more effective...
-
The MVM ventilator and 3D\(\pi \) PET scanner development arising from basic science work
During the COVID-19 pandemic, members of the DarkSide-20k (DS) Dark Matter international experimental collaboration together with engineers,...
-
Standards and Best Practices
Cyber resilience is an emerging and highly dynamic discipline that poses major challenges for many organizations. For effective design,... -
Road to a Sustainable Human Reliability Program and Implementation Strategy
The Human Reliability Program (HRP) is a security and safety reliability program designed to ensure that individuals who occupy positions affording... -
Enhancing Cybersecurity in Industrial Control Systems Through GRC Framework: Principles, Regulations, and Risk Assessment
Information security’s primary purpose is to safeguard confidentiality, integrity, and availability. Moreover, as a result of the current global... -
A Comparative Analysis of OIML Documents and Russian Rules on the Use of Reference Materials
The article analyzes the compliance of Russian legal documents with the Recommendations of the International Organization of Legal Metrology... -
Safety, Regulations, Metrology and Standards in Neutron Imaging
This chapter deals with the safety, regulations and standards towards the implementation of neutron imaging activities in any neutron source. The... -
Education and Training in MR-Based Radiation Treatment
Magnetic resonance image (MR)-guided radiotherapy (MRgRT) is a modern treatment modality in radiation oncology. This system permits to exploit MR... -
Legal Aspects of Network Security
In this article, we will examine some of the international- EU- and Hungarian legal frameworks for network security, summarize them and outline... -
Internet of Things (IoT) System Security Vulnerabilities and Its Mitigation
The Internet is the most important technology created, like a fabric woven into each of our lives. Over the years the internet has evolved into the... -
Tends in Engineering Asset Management: The Impact of Transformative Technologies on Risk and Reliability Management
The strategic focus of the modern-day managers has been on seeking transformative technological and business solutions to ensure the safe and... -
Effective Management and Implementation of a PRA Project for a Safety Critical System
A Probabilistic Risk Assessment project for safety critical system requires multi-disciplinary approach where apart from modeling and statistical... -
Obtaining Landing Licenses and Permission to Operate LEO Constellations on a Global Basis
It is important to have a clear understanding of the system architecture and the business model of a satellite system before embarking on the... -
AstroSat proposal processing system
AstroSat Proposal Processing System (APPS) is a mission critical software solution designed and developed by the joint efforts of Indian Space...
-
Management (III): Quality Management and Risk Control
A space science project is a space engineering project in the first place. The realization of its scientific objectives depends on the successful... -
Oppenheimer Reviled
In the immediate post-war years, Oppenheimer was a unique figure in America. He was, as Glauber put it, being lionized all the time. His picture was... -
Prospects and Challenges with Legal Informatics and Legal Metrology Framework in the Context of Industry 6.0
Industry 6.0 is viewed as a futuristic industrial evolution. It aims to set the synergy between man and robot by providing the wealth affluence away...
-
Quantum based flexible secure authentication protocol (SAP) for device to device (D2D) communication
Comprehensive inquisition of wireless communication with flexible quantum electronics and physics can be considered as one of the blooming...
-
Emergency Management System Application in Management of Terrorist Incidents
Terrorism is a universal threat to the USA with risks from domestic, transnational, and “lone wolf” actors. While the ultimate goal is to prevent... -
Emergency Management System Application in Management of Terrorist Incidents
Terrorism is a universal threat to the USA with risks from domestic, transnational, and “lone wolf” actors. While the ultimate goal is to prevent...