Letteratura scientifica selezionata sul tema "Protection"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Protection".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Protection"
Lai, Jessica C., e Samuel I. Becher. "Protecting Consumer Protection". Victoria University of Wellington Law Review 49, n. 2 (1 agosto 2018): 259. http://dx.doi.org/10.26686/vuwlr.v49i2.5324.
Testo completoMasson, Judith. "Police protection - protecting whom?" Journal of Social Welfare and Family Law 24, n. 2 (marzo 2002): 157–73. http://dx.doi.org/10.1080/09649060210136229.
Testo completoGauci, Jean-Pierre. "Protecting Trafficked Persons through Refugee Protection". Social Sciences 11, n. 7 (8 luglio 2022): 294. http://dx.doi.org/10.3390/socsci11070294.
Testo completoPérez-Molina, M. J., P. Eguía, D. M. Larruskain, I. Aranzabal e E. Torres. "Performance of a protection system for DC grids". Renewable Energy and Power Quality Journal 20 (settembre 2022): 18–23. http://dx.doi.org/10.24084/repqj20.209.
Testo completoFick, Sarah, e Michel Vols. "Best Protection Against Eviction?" European Journal of Comparative Law and Governance 3, n. 1 (21 febbraio 2016): 40–69. http://dx.doi.org/10.1163/22134514-00301002.
Testo completoWrennall, Lynne. "Surveillance and Child Protection: De-mystifying the Trojan Horse". Surveillance & Society 7, n. 3/4 (6 luglio 2010): 304–24. http://dx.doi.org/10.24908/ss.v7i3/4.4158.
Testo completoMonika, Monika, e Jarosław Frydrych. "Olej ochronny o niskiej lepkości do czasowej ochrony elementów metalowych przed korozją". Nafta-Gaz 76, n. 11 (novembre 2020): 864–69. http://dx.doi.org/10.18668/ng.2020.11.12.
Testo completoLuckock, Barry. "Protecting Powers: Emergency Intervention for Children's Protection". Child & Family Social Work 12, n. 4 (novembre 2007): 442–43. http://dx.doi.org/10.1111/j.1365-2206.2007.00522.x.
Testo completoScotuzzi, C. A. S., e J. M. Adam. "School Protection System: Protecting Who, from Whom?" Procedia - Social and Behavioral Sciences 55 (ottobre 2012): 429–34. http://dx.doi.org/10.1016/j.sbspro.2012.09.521.
Testo completoReichrath, Priv Doz Dr med Jörg. "Protecting against adverse effects of sun protection". Journal of the American Academy of Dermatology 49, n. 6 (dicembre 2003): 1204–6. http://dx.doi.org/10.1016/s0190-9622(03)02142-x.
Testo completoTesi sul tema "Protection"
Aranda, Ligia Esther. "Protecting CHAAC's gift--groundwater protection in Yucatan, Mexico". Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/63206.
Testo completoKoval, L. A., e T. N. Burenko. "Environmental protection". Thesis, Вид-во СумДУ, 2007. http://essuir.sumdu.edu.ua/handle/123456789/17562.
Testo completoClausen, Jenelle. "Asset Protection". Bowling Green State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1429269560.
Testo completoBradley, Lucy. "Frost Protection". College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 1998. http://hdl.handle.net/10150/144680.
Testo completoThe variation of the first and the last frost date is due to differences in elevation, density of population and several other factor, including a variation in temperature from year to year. All these variations make it more difficult to protect plants. To adequately protect your plants from frost damage you need to understand cold weather; how plants respond to cold; how heat is transferred; how to prevent frost damage; symptoms of frost damage and how to care for plants that have been damaged by frost.
Stevens, Katy. "Thermophysiological comfort and water resistant protection in soft shell protective garments". Thesis, University of Leeds, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.493789.
Testo completoGerhardsson, Daniel. "Starter Motor Protection". Thesis, Linköping University, Vehicular Systems, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-57309.
Testo completoStarter motors are sensitive for overheating. By estimating the temperature and
preventing cranking in time, there is an option to avoid the dangerous temperatures.
The truck manufacturer Scania CV AB proposed a master thesis that
should evaluate the need of an overheating protection for the starter motor.
The aim is to evaluate any positive effects of implementing an algorithm that
can estimate the brush temperature instead of using the available time constrain,
which allows 35 seconds of cranking with a following 2 seconds delay, allowing the
crank shaft to stop before a new start attempt is allowed. To achieve high load
on the starter motor and high temperature in the brushes, tests were performed
under
Initial testing on truck, under normal temperatures, showed that the batteries
could not run the starter motor long enough to reach high temperatures in the
brushes. This is believed to be caused by the voltage drop between the batteries
and the starter motor, causing the starter motor to run in an operating area it
is not optimized for. There are several other problems which gives a higher load
on the engine, for example oil viscosity, resulting in higher currents, but those are
not mentioned in this report.
Three different models are compared, Two State Model, Single State Model
and a Time Constrained Model. Tests and verifications show that the Two State
Model is superior when it comes to protecting the starter motor from overheating
and at the same time maximizing the cranking time. The major difference between
the Two State Model and the Single State Model are the cooling characteristics.
In the Single State Model the brush temperature drops quickly to the outside
temperature while in the Two State Model the brush temperature drops to a
second state temperature instead of the outside temperature. With the currently
implemented time constrain it is possible to overheat the starter motor. The
algorithms are optimized under cold conditions, due to problems in reaching high
temperatures under warmer conditions.
−20 Celsius.
Mellstrand, Per. "Informed system protection /". Karlskrona : Department of Interaction and System Design, Blekinge Institute of Technology, 2007. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/169a9a18d7974145c12572f00031dd2b?OpenDocument.
Testo completoInuwa, A. D. "Smart motor protection". Thesis, University of Sussex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431615.
Testo completoSvensson, Niklas, e Martin Holmberg. "Offshore cable protection". Thesis, Linnéuniversitetet, Institutionen för maskinteknik (MT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34775.
Testo completoShwani, Hazim G. "Critical infrastructure protection". Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555605.
Testo completoThis research study focused on identifying the protection of critical infrastructures and enhancing cybersecurity. The most recent cyber practice that is in place to protect critical infrastructures was also explored. From the literature review, it was concluded there are security loopholes in critical infrastructures. The study also uncovered that the federal government uses the newest cybersecurity tools, but does not share cyber vulnerabilities and risks with the private sector operating the infrastructures. The study also included an in-depth examination of Congressional documents pertaining to cybersecurity. However, it concluded that implementing rules and regulations is an ardouous step for the US Congress due to conflicts of interest. Finaly, the studied uncovered robust training, information sharing, and a contingency plan as the DHS's strategy to adapt to cyber threats that are emerging. Key Words: Critical Infrastructure, Cybersecurity.
Libri sul tema "Protection"
Munger, Charles G. Corrosion protection by protective coatings. 2a ed. Houston, TX: National Association of Corrosion Engineers, 1999.
Cerca il testo completoInstitution, British Standards. Protective clothing - protection against liquid chemicals. London: B.S.I, 1995.
Cerca il testo completoInstitution, British Standards. Protective clothing - protection against liquid chemicals -. London: B.S.I, 1995.
Cerca il testo completoHarry, Ferguson, McNamara Tony e Institute of Public Administration (Dublin, Ireland), a cura di. Protecting Irish children: Investigation, protection & welfare. Dublin: Institute of Public Administration, 1996.
Cerca il testo completoShapiro, Gregg. Protection. Arlington, Va: Gival Press, 2008.
Cerca il testo completoBill, James. Protection. Woodstock, Vt: Foul Play Press, 1992.
Cerca il testo completoBill, James. Protection. London: Robinson, 2008.
Cerca il testo completoMoffat, G. J. Protection. London: Headline, 2013.
Cerca il testo completoBill, James. Protection. London: Penguin, 1989.
Cerca il testo completoInstitution, British Standards. Protective clothing: Protection against heat and flame. London: B.S.I., 1987.
Cerca il testo completoCapitoli di libri sul tema "Protection"
Slim, Hugo, e Andrew Bonwick. "Prelims - Protection". In Protection, 1–10. Rugby, Warwickshire, United Kingdom: Oxfam Publishing, 2005. http://dx.doi.org/10.3362/9780855988869.000.
Testo completoSlim, Hugo, e Andrew Bonwick. "1. Protection". In Protection, 11–118. Rugby, Warwickshire, United Kingdom: Oxfam Publishing, 2005. http://dx.doi.org/10.3362/9780855988869.001.
Testo completoLister, A. M., e R. D. Eager. "Protection". In Fundamentals of Operating Systems, 140–52. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4757-2252-9_9.
Testo completoAycock, John. "Protection". In Retrogame Archeology, 145–71. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30004-7_7.
Testo completoIwasa, Yukikazu. "PROTECTION". In Case Studies in Superconducting Magnets, 1–78. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/b112047_8.
Testo completoJacobs, Marius. "Protection". In The Tropical Rain Forest, 237–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-72793-1_18.
Testo completoMaier, Martin. "Protection". In Metropolitan Area WDM Networks, 251–61. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0511-2_9.
Testo completoCapra, L. G. "Protection". In The Care of the Cancer Patient, 435–42. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18386-9_25.
Testo completoCetindamar, Dilek, Rob Phaal e David Probert. "Protection". In Technology Management, 125–40. London: Macmillan Education UK, 2010. http://dx.doi.org/10.1007/978-1-349-92389-2_6.
Testo completoScaddan, Brian. "Protection". In Electrical Installation Work, 219–31. 10a ed. London: Routledge, 2022. http://dx.doi.org/10.1201/9781003324324-17.
Testo completoAtti di convegni sul tema "Protection"
Jeličić, Mladen. "Protection of Victims of Domestic Violence in Misdemeanor Procedure". In The Position of Victims in the Republic of Serbia. Institute of Criminological and Sociological Research, 2024. http://dx.doi.org/10.47152/palic2024.6.
Testo completode Souza, Alisson Barbosa, Antonio Sergio de S Vieira, Jessyca Alencar L. e Silva, Alencar L. e Silva e Joaquim Celestino Junior. "Survivability on optical networks: Protecting the protection". In 2009 International Conference on Ultra Modern Telecommunications & Workshops. ICUMT 2009. IEEE, 2009. http://dx.doi.org/10.1109/icumt.2009.5345521.
Testo completoMuntiyono, Samun Haris, Budi Nuryono, Andrew Ghea Mahardika, Hetty Fadriani e Iman Hidayat. "Protection of Construction Workers with Personal Protective Equipment". In 1st Paris Van Java International Seminar on Health, Economics, Social Science and Humanities (PVJ-ISHESSH 2020). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210304.085.
Testo completoPentreath, R. J. "Protecting animals within a revised radiological protection framework". In The Sixth International Symposium on the System of Radiological Protection. SAGE Publications Ltd., 2023. http://dx.doi.org/10.54320/gqqa6177.
Testo completoSummers, Angela E., e Bryan A. Zachary. "High Integrity Protection Systems". In ASME/JSME 2004 Pressure Vessels and Piping Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/pvp2004-3021.
Testo completoMiryasova, Lyudmila I., Shi Yongxing, Natalia N. Muravyeva e Olga V. Dymchenko. "Realisation of the Russian customs policy in the conditions of protection of the national market". In Sustainable and Innovative Development in the Global Digital Age. Dela Press Publishing House, 2022. http://dx.doi.org/10.56199/dpcsebm.yghb1113.
Testo completoIlar, M., e M. Wittwer. "Numerical Generator Protection Offers New Benefits of Gas Turbines". In ASME 1992 International Gas Turbine and Aeroengine Congress and Exposition. American Society of Mechanical Engineers, 1992. http://dx.doi.org/10.1115/92-gt-268.
Testo completo"Fengxiang Color Protection Digital Protection in Shaanxi". In 2018 4th International Conference on Education & Training, Management and Humanities Science. Clausius Scientific Press, 2018. http://dx.doi.org/10.23977/etmhs.2018.29180.
Testo completoZhang, Hao, Jinghan He, Tony Yip e Z. Q. Bo. "Accelerate protection scheme in integrated protection system". In 2011 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies" (ISGT Europe). IEEE, 2011. http://dx.doi.org/10.1109/isgteurope.2011.6162719.
Testo completoШагапов, Илдар, e Рауф Яппаров. "ABOUTTECHNICALMEANS OF PROTECTION IN PROTECTION OF INFORMATION". In Информационные технологии обеспечения комплексной безопасности в цифровом обществе: сборник материалов V Всероссийской молодежной научно-практической конференции. Baskir State University, 2022. http://dx.doi.org/10.33184/itokbco-2022-05-20.10.
Testo completoRapporti di organizzazioni sul tema "Protection"
Imai, Susumu, Hajime Katayama e Kala Krishna. Protection for Sale or Surge Protection? Cambridge, MA: National Bureau of Economic Research, maggio 2006. http://dx.doi.org/10.3386/w12258.
Testo completoFry, R. J. M. (Radiation protection). Office of Scientific and Technical Information (OSTI), dicembre 1986. http://dx.doi.org/10.2172/5601696.
Testo completoCanavan, G. H. Force protection. Office of Scientific and Technical Information (OSTI), dicembre 1998. http://dx.doi.org/10.2172/562589.
Testo completoCohen, Fred. Information Protection. Fort Belvoir, VA: Defense Technical Information Center, luglio 1987. http://dx.doi.org/10.21236/ada236208.
Testo completoSwaja, R. (Radiation protection). Office of Scientific and Technical Information (OSTI), maggio 1988. http://dx.doi.org/10.2172/7043227.
Testo completoSecrest, Jana, Jordan Douglas e Stephanie Archuleta. Radiation Protection. Office of Scientific and Technical Information (OSTI), novembre 2023. http://dx.doi.org/10.2172/2205033.
Testo completoCochran, Lainy, e Kevin Hart. Environmental Protection Agency Drinking Water Protective Action Guides Implementation Recommendations. Office of Scientific and Technical Information (OSTI), dicembre 2021. http://dx.doi.org/10.2172/1835989.
Testo completoSeverino, Felipe, Meta Brown e Rajashri Chakrabarti. Personal Bankruptcy Protection and Household Debt. Federal Reserve Bank of New York, aprile 2024. http://dx.doi.org/10.59576/sr.1099.
Testo completoTomko, John S., e Jr. Critical Infrastructure Protection. Fort Belvoir, VA: Defense Technical Information Center, aprile 2002. http://dx.doi.org/10.21236/ada401004.
Testo completoSaadawi, Tarek, Jr Jordan e Louis. Cyber Infrastructure Protection. Fort Belvoir, VA: Defense Technical Information Center, maggio 2011. http://dx.doi.org/10.21236/ada543040.
Testo completo