Literatura académica sobre el tema "Protection"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Protection".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Protection"
Lai, Jessica C. y Samuel I. Becher. "Protecting Consumer Protection". Victoria University of Wellington Law Review 49, n.º 2 (1 de agosto de 2018): 259. http://dx.doi.org/10.26686/vuwlr.v49i2.5324.
Texto completoMasson, Judith. "Police protection - protecting whom?" Journal of Social Welfare and Family Law 24, n.º 2 (marzo de 2002): 157–73. http://dx.doi.org/10.1080/09649060210136229.
Texto completoGauci, Jean-Pierre. "Protecting Trafficked Persons through Refugee Protection". Social Sciences 11, n.º 7 (8 de julio de 2022): 294. http://dx.doi.org/10.3390/socsci11070294.
Texto completoPérez-Molina, M. J., P. Eguía, D. M. Larruskain, I. Aranzabal y E. Torres. "Performance of a protection system for DC grids". Renewable Energy and Power Quality Journal 20 (septiembre de 2022): 18–23. http://dx.doi.org/10.24084/repqj20.209.
Texto completoFick, Sarah y Michel Vols. "Best Protection Against Eviction?" European Journal of Comparative Law and Governance 3, n.º 1 (21 de febrero de 2016): 40–69. http://dx.doi.org/10.1163/22134514-00301002.
Texto completoWrennall, Lynne. "Surveillance and Child Protection: De-mystifying the Trojan Horse". Surveillance & Society 7, n.º 3/4 (6 de julio de 2010): 304–24. http://dx.doi.org/10.24908/ss.v7i3/4.4158.
Texto completoMonika, Monika y Jarosław Frydrych. "Olej ochronny o niskiej lepkości do czasowej ochrony elementów metalowych przed korozją". Nafta-Gaz 76, n.º 11 (noviembre de 2020): 864–69. http://dx.doi.org/10.18668/ng.2020.11.12.
Texto completoLuckock, Barry. "Protecting Powers: Emergency Intervention for Children's Protection". Child & Family Social Work 12, n.º 4 (noviembre de 2007): 442–43. http://dx.doi.org/10.1111/j.1365-2206.2007.00522.x.
Texto completoScotuzzi, C. A. S. y J. M. Adam. "School Protection System: Protecting Who, from Whom?" Procedia - Social and Behavioral Sciences 55 (octubre de 2012): 429–34. http://dx.doi.org/10.1016/j.sbspro.2012.09.521.
Texto completoReichrath, Priv Doz Dr med Jörg. "Protecting against adverse effects of sun protection". Journal of the American Academy of Dermatology 49, n.º 6 (diciembre de 2003): 1204–6. http://dx.doi.org/10.1016/s0190-9622(03)02142-x.
Texto completoTesis sobre el tema "Protection"
Aranda, Ligia Esther. "Protecting CHAAC's gift--groundwater protection in Yucatan, Mexico". Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/63206.
Texto completoKoval, L. A. y T. N. Burenko. "Environmental protection". Thesis, Вид-во СумДУ, 2007. http://essuir.sumdu.edu.ua/handle/123456789/17562.
Texto completoClausen, Jenelle. "Asset Protection". Bowling Green State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1429269560.
Texto completoBradley, Lucy. "Frost Protection". College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 1998. http://hdl.handle.net/10150/144680.
Texto completoThe variation of the first and the last frost date is due to differences in elevation, density of population and several other factor, including a variation in temperature from year to year. All these variations make it more difficult to protect plants. To adequately protect your plants from frost damage you need to understand cold weather; how plants respond to cold; how heat is transferred; how to prevent frost damage; symptoms of frost damage and how to care for plants that have been damaged by frost.
Stevens, Katy. "Thermophysiological comfort and water resistant protection in soft shell protective garments". Thesis, University of Leeds, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.493789.
Texto completoGerhardsson, Daniel. "Starter Motor Protection". Thesis, Linköping University, Vehicular Systems, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-57309.
Texto completoStarter motors are sensitive for overheating. By estimating the temperature and
preventing cranking in time, there is an option to avoid the dangerous temperatures.
The truck manufacturer Scania CV AB proposed a master thesis that
should evaluate the need of an overheating protection for the starter motor.
The aim is to evaluate any positive effects of implementing an algorithm that
can estimate the brush temperature instead of using the available time constrain,
which allows 35 seconds of cranking with a following 2 seconds delay, allowing the
crank shaft to stop before a new start attempt is allowed. To achieve high load
on the starter motor and high temperature in the brushes, tests were performed
under
Initial testing on truck, under normal temperatures, showed that the batteries
could not run the starter motor long enough to reach high temperatures in the
brushes. This is believed to be caused by the voltage drop between the batteries
and the starter motor, causing the starter motor to run in an operating area it
is not optimized for. There are several other problems which gives a higher load
on the engine, for example oil viscosity, resulting in higher currents, but those are
not mentioned in this report.
Three different models are compared, Two State Model, Single State Model
and a Time Constrained Model. Tests and verifications show that the Two State
Model is superior when it comes to protecting the starter motor from overheating
and at the same time maximizing the cranking time. The major difference between
the Two State Model and the Single State Model are the cooling characteristics.
In the Single State Model the brush temperature drops quickly to the outside
temperature while in the Two State Model the brush temperature drops to a
second state temperature instead of the outside temperature. With the currently
implemented time constrain it is possible to overheat the starter motor. The
algorithms are optimized under cold conditions, due to problems in reaching high
temperatures under warmer conditions.
−20 Celsius.
Mellstrand, Per. "Informed system protection /". Karlskrona : Department of Interaction and System Design, Blekinge Institute of Technology, 2007. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/169a9a18d7974145c12572f00031dd2b?OpenDocument.
Texto completoInuwa, A. D. "Smart motor protection". Thesis, University of Sussex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431615.
Texto completoSvensson, Niklas y Martin Holmberg. "Offshore cable protection". Thesis, Linnéuniversitetet, Institutionen för maskinteknik (MT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34775.
Texto completoShwani, Hazim G. "Critical infrastructure protection". Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555605.
Texto completoThis research study focused on identifying the protection of critical infrastructures and enhancing cybersecurity. The most recent cyber practice that is in place to protect critical infrastructures was also explored. From the literature review, it was concluded there are security loopholes in critical infrastructures. The study also uncovered that the federal government uses the newest cybersecurity tools, but does not share cyber vulnerabilities and risks with the private sector operating the infrastructures. The study also included an in-depth examination of Congressional documents pertaining to cybersecurity. However, it concluded that implementing rules and regulations is an ardouous step for the US Congress due to conflicts of interest. Finaly, the studied uncovered robust training, information sharing, and a contingency plan as the DHS's strategy to adapt to cyber threats that are emerging. Key Words: Critical Infrastructure, Cybersecurity.
Libros sobre el tema "Protection"
Munger, Charles G. Corrosion protection by protective coatings. 2a ed. Houston, TX: National Association of Corrosion Engineers, 1999.
Buscar texto completoInstitution, British Standards. Protective clothing - protection against liquid chemicals. London: B.S.I, 1995.
Buscar texto completoHarry, Ferguson, McNamara Tony y Institute of Public Administration (Dublin, Ireland), eds. Protecting Irish children: Investigation, protection & welfare. Dublin: Institute of Public Administration, 1996.
Buscar texto completoInstitution, British Standards. Protective clothing - protection against liquid chemicals -. London: B.S.I, 1995.
Buscar texto completoProtection. San Bernardino, California: Createspace, 2014.
Buscar texto completoProtection. London: Headline, 2007.
Buscar texto completoShapiro, Gregg. Protection. Arlington, Va: Gival Press, 2008.
Buscar texto completoBill, James. Protection. Woodstock, Vt: Foul Play Press, 1992.
Buscar texto completoProtection. London]: Bloomsbury, 2015.
Buscar texto completoBill, James. Protection. London: Robinson, 2008.
Buscar texto completoCapítulos de libros sobre el tema "Protection"
Slim, Hugo y Andrew Bonwick. "Prelims - Protection". En Protection, 1–10. Rugby, Warwickshire, United Kingdom: Oxfam Publishing, 2005. http://dx.doi.org/10.3362/9780855988869.000.
Texto completoSlim, Hugo y Andrew Bonwick. "1. Protection". En Protection, 11–118. Rugby, Warwickshire, United Kingdom: Oxfam Publishing, 2005. http://dx.doi.org/10.3362/9780855988869.001.
Texto completoLister, A. M. y R. D. Eager. "Protection". En Fundamentals of Operating Systems, 140–52. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4757-2252-9_9.
Texto completoAycock, John. "Protection". En Retrogame Archeology, 145–71. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30004-7_7.
Texto completoIwasa, Yukikazu. "PROTECTION". En Case Studies in Superconducting Magnets, 1–78. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/b112047_8.
Texto completoJacobs, Marius. "Protection". En The Tropical Rain Forest, 237–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-72793-1_18.
Texto completoMaier, Martin. "Protection". En Metropolitan Area WDM Networks, 251–61. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0511-2_9.
Texto completoCapra, L. G. "Protection". En The Care of the Cancer Patient, 435–42. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18386-9_25.
Texto completoCetindamar, Dilek, Rob Phaal y David Probert. "Protection". En Technology Management, 125–40. London: Macmillan Education UK, 2010. http://dx.doi.org/10.1007/978-1-349-92389-2_6.
Texto completoScaddan, Brian. "Protection". En Electrical Installation Work, 219–31. 10a ed. London: Routledge, 2022. http://dx.doi.org/10.1201/9781003324324-17.
Texto completoActas de conferencias sobre el tema "Protection"
Jeličić, Mladen. "Protection of Victims of Domestic Violence in Misdemeanor Procedure". En The Position of Victims in the Republic of Serbia. Institute of Criminological and Sociological Research, 2024. http://dx.doi.org/10.47152/palic2024.6.
Texto completode Souza, Alisson Barbosa, Antonio Sergio de S Vieira, Jessyca Alencar L. e Silva, Alencar L. e Silva y Joaquim Celestino Junior. "Survivability on optical networks: Protecting the protection". En 2009 International Conference on Ultra Modern Telecommunications & Workshops. ICUMT 2009. IEEE, 2009. http://dx.doi.org/10.1109/icumt.2009.5345521.
Texto completoMuntiyono, Samun Haris, Budi Nuryono, Andrew Ghea Mahardika, Hetty Fadriani y Iman Hidayat. "Protection of Construction Workers with Personal Protective Equipment". En 1st Paris Van Java International Seminar on Health, Economics, Social Science and Humanities (PVJ-ISHESSH 2020). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210304.085.
Texto completoPentreath, R. J. "Protecting animals within a revised radiological protection framework". En The Sixth International Symposium on the System of Radiological Protection. SAGE Publications Ltd., 2023. http://dx.doi.org/10.54320/gqqa6177.
Texto completoSummers, Angela E. y Bryan A. Zachary. "High Integrity Protection Systems". En ASME/JSME 2004 Pressure Vessels and Piping Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/pvp2004-3021.
Texto completoMiryasova, Lyudmila I., Shi Yongxing, Natalia N. Muravyeva y Olga V. Dymchenko. "Realisation of the Russian customs policy in the conditions of protection of the national market". En Sustainable and Innovative Development in the Global Digital Age. Dela Press Publishing House, 2022. http://dx.doi.org/10.56199/dpcsebm.yghb1113.
Texto completoIlar, M. y M. Wittwer. "Numerical Generator Protection Offers New Benefits of Gas Turbines". En ASME 1992 International Gas Turbine and Aeroengine Congress and Exposition. American Society of Mechanical Engineers, 1992. http://dx.doi.org/10.1115/92-gt-268.
Texto completo"Fengxiang Color Protection Digital Protection in Shaanxi". En 2018 4th International Conference on Education & Training, Management and Humanities Science. Clausius Scientific Press, 2018. http://dx.doi.org/10.23977/etmhs.2018.29180.
Texto completoZhang, Hao, Jinghan He, Tony Yip y Z. Q. Bo. "Accelerate protection scheme in integrated protection system". En 2011 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies" (ISGT Europe). IEEE, 2011. http://dx.doi.org/10.1109/isgteurope.2011.6162719.
Texto completoШагапов, Илдар y Рауф Яппаров. "ABOUTTECHNICALMEANS OF PROTECTION IN PROTECTION OF INFORMATION". En Информационные технологии обеспечения комплексной безопасности в цифровом обществе: сборник материалов V Всероссийской молодежной научно-практической конференции. Baskir State University, 2022. http://dx.doi.org/10.33184/itokbco-2022-05-20.10.
Texto completoInformes sobre el tema "Protection"
Imai, Susumu, Hajime Katayama y Kala Krishna. Protection for Sale or Surge Protection? Cambridge, MA: National Bureau of Economic Research, mayo de 2006. http://dx.doi.org/10.3386/w12258.
Texto completoFry, R. J. M. (Radiation protection). Office of Scientific and Technical Information (OSTI), diciembre de 1986. http://dx.doi.org/10.2172/5601696.
Texto completoCanavan, G. H. Force protection. Office of Scientific and Technical Information (OSTI), diciembre de 1998. http://dx.doi.org/10.2172/562589.
Texto completoCohen, Fred. Information Protection. Fort Belvoir, VA: Defense Technical Information Center, julio de 1987. http://dx.doi.org/10.21236/ada236208.
Texto completoSwaja, R. (Radiation protection). Office of Scientific and Technical Information (OSTI), mayo de 1988. http://dx.doi.org/10.2172/7043227.
Texto completoSecrest, Jana, Jordan Douglas y Stephanie Archuleta. Radiation Protection. Office of Scientific and Technical Information (OSTI), noviembre de 2023. http://dx.doi.org/10.2172/2205033.
Texto completoCochran, Lainy y Kevin Hart. Environmental Protection Agency Drinking Water Protective Action Guides Implementation Recommendations. Office of Scientific and Technical Information (OSTI), diciembre de 2021. http://dx.doi.org/10.2172/1835989.
Texto completoSeverino, Felipe, Meta Brown y Rajashri Chakrabarti. Personal Bankruptcy Protection and Household Debt. Federal Reserve Bank of New York, abril de 2024. http://dx.doi.org/10.59576/sr.1099.
Texto completoTomko, John S. y Jr. Critical Infrastructure Protection. Fort Belvoir, VA: Defense Technical Information Center, abril de 2002. http://dx.doi.org/10.21236/ada401004.
Texto completoSaadawi, Tarek, Jr Jordan y Louis. Cyber Infrastructure Protection. Fort Belvoir, VA: Defense Technical Information Center, mayo de 2011. http://dx.doi.org/10.21236/ada543040.
Texto completo