Academic literature on the topic 'Protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protection"
Lai, Jessica C., and Samuel I. Becher. "Protecting Consumer Protection." Victoria University of Wellington Law Review 49, no. 2 (August 1, 2018): 259. http://dx.doi.org/10.26686/vuwlr.v49i2.5324.
Full textMasson, Judith. "Police protection - protecting whom?" Journal of Social Welfare and Family Law 24, no. 2 (March 2002): 157–73. http://dx.doi.org/10.1080/09649060210136229.
Full textGauci, Jean-Pierre. "Protecting Trafficked Persons through Refugee Protection." Social Sciences 11, no. 7 (July 8, 2022): 294. http://dx.doi.org/10.3390/socsci11070294.
Full textPérez-Molina, M. J., P. Eguía, D. M. Larruskain, I. Aranzabal, and E. Torres. "Performance of a protection system for DC grids." Renewable Energy and Power Quality Journal 20 (September 2022): 18–23. http://dx.doi.org/10.24084/repqj20.209.
Full textFick, Sarah, and Michel Vols. "Best Protection Against Eviction?" European Journal of Comparative Law and Governance 3, no. 1 (February 21, 2016): 40–69. http://dx.doi.org/10.1163/22134514-00301002.
Full textWrennall, Lynne. "Surveillance and Child Protection: De-mystifying the Trojan Horse." Surveillance & Society 7, no. 3/4 (July 6, 2010): 304–24. http://dx.doi.org/10.24908/ss.v7i3/4.4158.
Full textMonika, Monika, and Jarosław Frydrych. "Olej ochronny o niskiej lepkości do czasowej ochrony elementów metalowych przed korozją." Nafta-Gaz 76, no. 11 (November 2020): 864–69. http://dx.doi.org/10.18668/ng.2020.11.12.
Full textLuckock, Barry. "Protecting Powers: Emergency Intervention for Children's Protection." Child & Family Social Work 12, no. 4 (November 2007): 442–43. http://dx.doi.org/10.1111/j.1365-2206.2007.00522.x.
Full textScotuzzi, C. A. S., and J. M. Adam. "School Protection System: Protecting Who, from Whom?" Procedia - Social and Behavioral Sciences 55 (October 2012): 429–34. http://dx.doi.org/10.1016/j.sbspro.2012.09.521.
Full textReichrath, Priv Doz Dr med Jörg. "Protecting against adverse effects of sun protection." Journal of the American Academy of Dermatology 49, no. 6 (December 2003): 1204–6. http://dx.doi.org/10.1016/s0190-9622(03)02142-x.
Full textDissertations / Theses on the topic "Protection"
Aranda, Ligia Esther. "Protecting CHAAC's gift--groundwater protection in Yucatan, Mexico." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/63206.
Full textKoval, L. A., and T. N. Burenko. "Environmental protection." Thesis, Вид-во СумДУ, 2007. http://essuir.sumdu.edu.ua/handle/123456789/17562.
Full textClausen, Jenelle. "Asset Protection." Bowling Green State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1429269560.
Full textBradley, Lucy. "Frost Protection." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 1998. http://hdl.handle.net/10150/144680.
Full textThe variation of the first and the last frost date is due to differences in elevation, density of population and several other factor, including a variation in temperature from year to year. All these variations make it more difficult to protect plants. To adequately protect your plants from frost damage you need to understand cold weather; how plants respond to cold; how heat is transferred; how to prevent frost damage; symptoms of frost damage and how to care for plants that have been damaged by frost.
Stevens, Katy. "Thermophysiological comfort and water resistant protection in soft shell protective garments." Thesis, University of Leeds, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.493789.
Full textGerhardsson, Daniel. "Starter Motor Protection." Thesis, Linköping University, Vehicular Systems, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-57309.
Full textStarter motors are sensitive for overheating. By estimating the temperature and
preventing cranking in time, there is an option to avoid the dangerous temperatures.
The truck manufacturer Scania CV AB proposed a master thesis that
should evaluate the need of an overheating protection for the starter motor.
The aim is to evaluate any positive effects of implementing an algorithm that
can estimate the brush temperature instead of using the available time constrain,
which allows 35 seconds of cranking with a following 2 seconds delay, allowing the
crank shaft to stop before a new start attempt is allowed. To achieve high load
on the starter motor and high temperature in the brushes, tests were performed
under
Initial testing on truck, under normal temperatures, showed that the batteries
could not run the starter motor long enough to reach high temperatures in the
brushes. This is believed to be caused by the voltage drop between the batteries
and the starter motor, causing the starter motor to run in an operating area it
is not optimized for. There are several other problems which gives a higher load
on the engine, for example oil viscosity, resulting in higher currents, but those are
not mentioned in this report.
Three different models are compared, Two State Model, Single State Model
and a Time Constrained Model. Tests and verifications show that the Two State
Model is superior when it comes to protecting the starter motor from overheating
and at the same time maximizing the cranking time. The major difference between
the Two State Model and the Single State Model are the cooling characteristics.
In the Single State Model the brush temperature drops quickly to the outside
temperature while in the Two State Model the brush temperature drops to a
second state temperature instead of the outside temperature. With the currently
implemented time constrain it is possible to overheat the starter motor. The
algorithms are optimized under cold conditions, due to problems in reaching high
temperatures under warmer conditions.
−20 Celsius.
Mellstrand, Per. "Informed system protection /." Karlskrona : Department of Interaction and System Design, Blekinge Institute of Technology, 2007. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/169a9a18d7974145c12572f00031dd2b?OpenDocument.
Full textInuwa, A. D. "Smart motor protection." Thesis, University of Sussex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431615.
Full textSvensson, Niklas, and Martin Holmberg. "Offshore cable protection." Thesis, Linnéuniversitetet, Institutionen för maskinteknik (MT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34775.
Full textShwani, Hazim G. "Critical infrastructure protection." Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555605.
Full textThis research study focused on identifying the protection of critical infrastructures and enhancing cybersecurity. The most recent cyber practice that is in place to protect critical infrastructures was also explored. From the literature review, it was concluded there are security loopholes in critical infrastructures. The study also uncovered that the federal government uses the newest cybersecurity tools, but does not share cyber vulnerabilities and risks with the private sector operating the infrastructures. The study also included an in-depth examination of Congressional documents pertaining to cybersecurity. However, it concluded that implementing rules and regulations is an ardouous step for the US Congress due to conflicts of interest. Finaly, the studied uncovered robust training, information sharing, and a contingency plan as the DHS's strategy to adapt to cyber threats that are emerging. Key Words: Critical Infrastructure, Cybersecurity.
Books on the topic "Protection"
Munger, Charles G. Corrosion protection by protective coatings. 2nd ed. Houston, TX: National Association of Corrosion Engineers, 1999.
Find full textInstitution, British Standards. Protective clothing - protection against liquid chemicals. London: B.S.I, 1995.
Find full textHarry, Ferguson, McNamara Tony, and Institute of Public Administration (Dublin, Ireland), eds. Protecting Irish children: Investigation, protection & welfare. Dublin: Institute of Public Administration, 1996.
Find full textInstitution, British Standards. Protective clothing - protection against liquid chemicals -. London: B.S.I, 1995.
Find full textProtection. San Bernardino, California: Createspace, 2014.
Find full textProtection. London: Headline, 2007.
Find full textShapiro, Gregg. Protection. Arlington, Va: Gival Press, 2008.
Find full textBill, James. Protection. Woodstock, Vt: Foul Play Press, 1992.
Find full textProtection. London]: Bloomsbury, 2015.
Find full textBill, James. Protection. London: Robinson, 2008.
Find full textBook chapters on the topic "Protection"
Slim, Hugo, and Andrew Bonwick. "Prelims - Protection." In Protection, 1–10. Rugby, Warwickshire, United Kingdom: Oxfam Publishing, 2005. http://dx.doi.org/10.3362/9780855988869.000.
Full textSlim, Hugo, and Andrew Bonwick. "1. Protection." In Protection, 11–118. Rugby, Warwickshire, United Kingdom: Oxfam Publishing, 2005. http://dx.doi.org/10.3362/9780855988869.001.
Full textLister, A. M., and R. D. Eager. "Protection." In Fundamentals of Operating Systems, 140–52. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4757-2252-9_9.
Full textAycock, John. "Protection." In Retrogame Archeology, 145–71. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30004-7_7.
Full textIwasa, Yukikazu. "PROTECTION." In Case Studies in Superconducting Magnets, 1–78. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/b112047_8.
Full textJacobs, Marius. "Protection." In The Tropical Rain Forest, 237–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-72793-1_18.
Full textMaier, Martin. "Protection." In Metropolitan Area WDM Networks, 251–61. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0511-2_9.
Full textCapra, L. G. "Protection." In The Care of the Cancer Patient, 435–42. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18386-9_25.
Full textCetindamar, Dilek, Rob Phaal, and David Probert. "Protection." In Technology Management, 125–40. London: Macmillan Education UK, 2010. http://dx.doi.org/10.1007/978-1-349-92389-2_6.
Full textScaddan, Brian. "Protection." In Electrical Installation Work, 219–31. 10th ed. London: Routledge, 2022. http://dx.doi.org/10.1201/9781003324324-17.
Full textConference papers on the topic "Protection"
Jeličić, Mladen. "Protection of Victims of Domestic Violence in Misdemeanor Procedure." In The Position of Victims in the Republic of Serbia. Institute of Criminological and Sociological Research, 2024. http://dx.doi.org/10.47152/palic2024.6.
Full textde Souza, Alisson Barbosa, Antonio Sergio de S Vieira, Jessyca Alencar L. e Silva, Alencar L. e Silva, and Joaquim Celestino Junior. "Survivability on optical networks: Protecting the protection." In 2009 International Conference on Ultra Modern Telecommunications & Workshops. ICUMT 2009. IEEE, 2009. http://dx.doi.org/10.1109/icumt.2009.5345521.
Full textMuntiyono, Samun Haris, Budi Nuryono, Andrew Ghea Mahardika, Hetty Fadriani, and Iman Hidayat. "Protection of Construction Workers with Personal Protective Equipment." In 1st Paris Van Java International Seminar on Health, Economics, Social Science and Humanities (PVJ-ISHESSH 2020). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210304.085.
Full textPentreath, R. J. "Protecting animals within a revised radiological protection framework." In The Sixth International Symposium on the System of Radiological Protection. SAGE Publications Ltd., 2023. http://dx.doi.org/10.54320/gqqa6177.
Full textSummers, Angela E., and Bryan A. Zachary. "High Integrity Protection Systems." In ASME/JSME 2004 Pressure Vessels and Piping Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/pvp2004-3021.
Full textMiryasova, Lyudmila I., Shi Yongxing, Natalia N. Muravyeva, and Olga V. Dymchenko. "Realisation of the Russian customs policy in the conditions of protection of the national market." In Sustainable and Innovative Development in the Global Digital Age. Dela Press Publishing House, 2022. http://dx.doi.org/10.56199/dpcsebm.yghb1113.
Full textIlar, M., and M. Wittwer. "Numerical Generator Protection Offers New Benefits of Gas Turbines." In ASME 1992 International Gas Turbine and Aeroengine Congress and Exposition. American Society of Mechanical Engineers, 1992. http://dx.doi.org/10.1115/92-gt-268.
Full text"Fengxiang Color Protection Digital Protection in Shaanxi." In 2018 4th International Conference on Education & Training, Management and Humanities Science. Clausius Scientific Press, 2018. http://dx.doi.org/10.23977/etmhs.2018.29180.
Full textZhang, Hao, Jinghan He, Tony Yip, and Z. Q. Bo. "Accelerate protection scheme in integrated protection system." In 2011 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies" (ISGT Europe). IEEE, 2011. http://dx.doi.org/10.1109/isgteurope.2011.6162719.
Full textШагапов, Илдар, and Рауф Яппаров. "ABOUTTECHNICALMEANS OF PROTECTION IN PROTECTION OF INFORMATION." In Информационные технологии обеспечения комплексной безопасности в цифровом обществе: сборник материалов V Всероссийской молодежной научно-практической конференции. Baskir State University, 2022. http://dx.doi.org/10.33184/itokbco-2022-05-20.10.
Full textReports on the topic "Protection"
Imai, Susumu, Hajime Katayama, and Kala Krishna. Protection for Sale or Surge Protection? Cambridge, MA: National Bureau of Economic Research, May 2006. http://dx.doi.org/10.3386/w12258.
Full textFry, R. J. M. (Radiation protection). Office of Scientific and Technical Information (OSTI), December 1986. http://dx.doi.org/10.2172/5601696.
Full textCanavan, G. H. Force protection. Office of Scientific and Technical Information (OSTI), December 1998. http://dx.doi.org/10.2172/562589.
Full textCohen, Fred. Information Protection. Fort Belvoir, VA: Defense Technical Information Center, July 1987. http://dx.doi.org/10.21236/ada236208.
Full textSwaja, R. (Radiation protection). Office of Scientific and Technical Information (OSTI), May 1988. http://dx.doi.org/10.2172/7043227.
Full textSecrest, Jana, Jordan Douglas, and Stephanie Archuleta. Radiation Protection. Office of Scientific and Technical Information (OSTI), November 2023. http://dx.doi.org/10.2172/2205033.
Full textCochran, Lainy, and Kevin Hart. Environmental Protection Agency Drinking Water Protective Action Guides Implementation Recommendations. Office of Scientific and Technical Information (OSTI), December 2021. http://dx.doi.org/10.2172/1835989.
Full textSeverino, Felipe, Meta Brown, and Rajashri Chakrabarti. Personal Bankruptcy Protection and Household Debt. Federal Reserve Bank of New York, April 2024. http://dx.doi.org/10.59576/sr.1099.
Full textTomko, John S., and Jr. Critical Infrastructure Protection. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada401004.
Full textSaadawi, Tarek, Jr Jordan, and Louis. Cyber Infrastructure Protection. Fort Belvoir, VA: Defense Technical Information Center, May 2011. http://dx.doi.org/10.21236/ada543040.
Full text