Gotowa bibliografia na temat „Protection”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Protection”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Protection"
Lai, Jessica C., i Samuel I. Becher. "Protecting Consumer Protection". Victoria University of Wellington Law Review 49, nr 2 (1.08.2018): 259. http://dx.doi.org/10.26686/vuwlr.v49i2.5324.
Pełny tekst źródłaMasson, Judith. "Police protection - protecting whom?" Journal of Social Welfare and Family Law 24, nr 2 (marzec 2002): 157–73. http://dx.doi.org/10.1080/09649060210136229.
Pełny tekst źródłaGauci, Jean-Pierre. "Protecting Trafficked Persons through Refugee Protection". Social Sciences 11, nr 7 (8.07.2022): 294. http://dx.doi.org/10.3390/socsci11070294.
Pełny tekst źródłaPérez-Molina, M. J., P. Eguía, D. M. Larruskain, I. Aranzabal i E. Torres. "Performance of a protection system for DC grids". Renewable Energy and Power Quality Journal 20 (wrzesień 2022): 18–23. http://dx.doi.org/10.24084/repqj20.209.
Pełny tekst źródłaFick, Sarah, i Michel Vols. "Best Protection Against Eviction?" European Journal of Comparative Law and Governance 3, nr 1 (21.02.2016): 40–69. http://dx.doi.org/10.1163/22134514-00301002.
Pełny tekst źródłaWrennall, Lynne. "Surveillance and Child Protection: De-mystifying the Trojan Horse". Surveillance & Society 7, nr 3/4 (6.07.2010): 304–24. http://dx.doi.org/10.24908/ss.v7i3/4.4158.
Pełny tekst źródłaMonika, Monika, i Jarosław Frydrych. "Olej ochronny o niskiej lepkości do czasowej ochrony elementów metalowych przed korozją". Nafta-Gaz 76, nr 11 (listopad 2020): 864–69. http://dx.doi.org/10.18668/ng.2020.11.12.
Pełny tekst źródłaLuckock, Barry. "Protecting Powers: Emergency Intervention for Children's Protection". Child & Family Social Work 12, nr 4 (listopad 2007): 442–43. http://dx.doi.org/10.1111/j.1365-2206.2007.00522.x.
Pełny tekst źródłaScotuzzi, C. A. S., i J. M. Adam. "School Protection System: Protecting Who, from Whom?" Procedia - Social and Behavioral Sciences 55 (październik 2012): 429–34. http://dx.doi.org/10.1016/j.sbspro.2012.09.521.
Pełny tekst źródłaReichrath, Priv Doz Dr med Jörg. "Protecting against adverse effects of sun protection". Journal of the American Academy of Dermatology 49, nr 6 (grudzień 2003): 1204–6. http://dx.doi.org/10.1016/s0190-9622(03)02142-x.
Pełny tekst źródłaRozprawy doktorskie na temat "Protection"
Aranda, Ligia Esther. "Protecting CHAAC's gift--groundwater protection in Yucatan, Mexico". Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/63206.
Pełny tekst źródłaKoval, L. A., i T. N. Burenko. "Environmental protection". Thesis, Вид-во СумДУ, 2007. http://essuir.sumdu.edu.ua/handle/123456789/17562.
Pełny tekst źródłaClausen, Jenelle. "Asset Protection". Bowling Green State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1429269560.
Pełny tekst źródłaBradley, Lucy. "Frost Protection". College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 1998. http://hdl.handle.net/10150/144680.
Pełny tekst źródłaThe variation of the first and the last frost date is due to differences in elevation, density of population and several other factor, including a variation in temperature from year to year. All these variations make it more difficult to protect plants. To adequately protect your plants from frost damage you need to understand cold weather; how plants respond to cold; how heat is transferred; how to prevent frost damage; symptoms of frost damage and how to care for plants that have been damaged by frost.
Stevens, Katy. "Thermophysiological comfort and water resistant protection in soft shell protective garments". Thesis, University of Leeds, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.493789.
Pełny tekst źródłaGerhardsson, Daniel. "Starter Motor Protection". Thesis, Linköping University, Vehicular Systems, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-57309.
Pełny tekst źródłaStarter motors are sensitive for overheating. By estimating the temperature and
preventing cranking in time, there is an option to avoid the dangerous temperatures.
The truck manufacturer Scania CV AB proposed a master thesis that
should evaluate the need of an overheating protection for the starter motor.
The aim is to evaluate any positive effects of implementing an algorithm that
can estimate the brush temperature instead of using the available time constrain,
which allows 35 seconds of cranking with a following 2 seconds delay, allowing the
crank shaft to stop before a new start attempt is allowed. To achieve high load
on the starter motor and high temperature in the brushes, tests were performed
under
Initial testing on truck, under normal temperatures, showed that the batteries
could not run the starter motor long enough to reach high temperatures in the
brushes. This is believed to be caused by the voltage drop between the batteries
and the starter motor, causing the starter motor to run in an operating area it
is not optimized for. There are several other problems which gives a higher load
on the engine, for example oil viscosity, resulting in higher currents, but those are
not mentioned in this report.
Three different models are compared, Two State Model, Single State Model
and a Time Constrained Model. Tests and verifications show that the Two State
Model is superior when it comes to protecting the starter motor from overheating
and at the same time maximizing the cranking time. The major difference between
the Two State Model and the Single State Model are the cooling characteristics.
In the Single State Model the brush temperature drops quickly to the outside
temperature while in the Two State Model the brush temperature drops to a
second state temperature instead of the outside temperature. With the currently
implemented time constrain it is possible to overheat the starter motor. The
algorithms are optimized under cold conditions, due to problems in reaching high
temperatures under warmer conditions.
−20 Celsius.
Mellstrand, Per. "Informed system protection /". Karlskrona : Department of Interaction and System Design, Blekinge Institute of Technology, 2007. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/169a9a18d7974145c12572f00031dd2b?OpenDocument.
Pełny tekst źródłaInuwa, A. D. "Smart motor protection". Thesis, University of Sussex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431615.
Pełny tekst źródłaSvensson, Niklas, i Martin Holmberg. "Offshore cable protection". Thesis, Linnéuniversitetet, Institutionen för maskinteknik (MT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34775.
Pełny tekst źródłaShwani, Hazim G. "Critical infrastructure protection". Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555605.
Pełny tekst źródłaThis research study focused on identifying the protection of critical infrastructures and enhancing cybersecurity. The most recent cyber practice that is in place to protect critical infrastructures was also explored. From the literature review, it was concluded there are security loopholes in critical infrastructures. The study also uncovered that the federal government uses the newest cybersecurity tools, but does not share cyber vulnerabilities and risks with the private sector operating the infrastructures. The study also included an in-depth examination of Congressional documents pertaining to cybersecurity. However, it concluded that implementing rules and regulations is an ardouous step for the US Congress due to conflicts of interest. Finaly, the studied uncovered robust training, information sharing, and a contingency plan as the DHS's strategy to adapt to cyber threats that are emerging. Key Words: Critical Infrastructure, Cybersecurity.
Książki na temat "Protection"
Munger, Charles G. Corrosion protection by protective coatings. Wyd. 2. Houston, TX: National Association of Corrosion Engineers, 1999.
Znajdź pełny tekst źródłaInstitution, British Standards. Protective clothing - protection against liquid chemicals. London: B.S.I, 1995.
Znajdź pełny tekst źródłaHarry, Ferguson, McNamara Tony i Institute of Public Administration (Dublin, Ireland), red. Protecting Irish children: Investigation, protection & welfare. Dublin: Institute of Public Administration, 1996.
Znajdź pełny tekst źródłaInstitution, British Standards. Protective clothing - protection against liquid chemicals -. London: B.S.I, 1995.
Znajdź pełny tekst źródłaProtection. San Bernardino, California: Createspace, 2014.
Znajdź pełny tekst źródłaProtection. London: Headline, 2007.
Znajdź pełny tekst źródłaShapiro, Gregg. Protection. Arlington, Va: Gival Press, 2008.
Znajdź pełny tekst źródłaBill, James. Protection. Woodstock, Vt: Foul Play Press, 1992.
Znajdź pełny tekst źródłaProtection. London]: Bloomsbury, 2015.
Znajdź pełny tekst źródłaBill, James. Protection. London: Robinson, 2008.
Znajdź pełny tekst źródłaCzęści książek na temat "Protection"
Slim, Hugo, i Andrew Bonwick. "Prelims - Protection". W Protection, 1–10. Rugby, Warwickshire, United Kingdom: Oxfam Publishing, 2005. http://dx.doi.org/10.3362/9780855988869.000.
Pełny tekst źródłaSlim, Hugo, i Andrew Bonwick. "1. Protection". W Protection, 11–118. Rugby, Warwickshire, United Kingdom: Oxfam Publishing, 2005. http://dx.doi.org/10.3362/9780855988869.001.
Pełny tekst źródłaLister, A. M., i R. D. Eager. "Protection". W Fundamentals of Operating Systems, 140–52. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4757-2252-9_9.
Pełny tekst źródłaAycock, John. "Protection". W Retrogame Archeology, 145–71. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30004-7_7.
Pełny tekst źródłaIwasa, Yukikazu. "PROTECTION". W Case Studies in Superconducting Magnets, 1–78. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/b112047_8.
Pełny tekst źródłaJacobs, Marius. "Protection". W The Tropical Rain Forest, 237–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-72793-1_18.
Pełny tekst źródłaMaier, Martin. "Protection". W Metropolitan Area WDM Networks, 251–61. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0511-2_9.
Pełny tekst źródłaCapra, L. G. "Protection". W The Care of the Cancer Patient, 435–42. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18386-9_25.
Pełny tekst źródłaCetindamar, Dilek, Rob Phaal i David Probert. "Protection". W Technology Management, 125–40. London: Macmillan Education UK, 2010. http://dx.doi.org/10.1007/978-1-349-92389-2_6.
Pełny tekst źródłaScaddan, Brian. "Protection". W Electrical Installation Work, 219–31. Wyd. 10. London: Routledge, 2022. http://dx.doi.org/10.1201/9781003324324-17.
Pełny tekst źródłaStreszczenia konferencji na temat "Protection"
Jeličić, Mladen. "Protection of Victims of Domestic Violence in Misdemeanor Procedure". W The Position of Victims in the Republic of Serbia. Institute of Criminological and Sociological Research, 2024. http://dx.doi.org/10.47152/palic2024.6.
Pełny tekst źródłade Souza, Alisson Barbosa, Antonio Sergio de S Vieira, Jessyca Alencar L. e Silva, Alencar L. e Silva i Joaquim Celestino Junior. "Survivability on optical networks: Protecting the protection". W 2009 International Conference on Ultra Modern Telecommunications & Workshops. ICUMT 2009. IEEE, 2009. http://dx.doi.org/10.1109/icumt.2009.5345521.
Pełny tekst źródłaMuntiyono, Samun Haris, Budi Nuryono, Andrew Ghea Mahardika, Hetty Fadriani i Iman Hidayat. "Protection of Construction Workers with Personal Protective Equipment". W 1st Paris Van Java International Seminar on Health, Economics, Social Science and Humanities (PVJ-ISHESSH 2020). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210304.085.
Pełny tekst źródłaPentreath, R. J. "Protecting animals within a revised radiological protection framework". W The Sixth International Symposium on the System of Radiological Protection. SAGE Publications Ltd., 2023. http://dx.doi.org/10.54320/gqqa6177.
Pełny tekst źródłaSummers, Angela E., i Bryan A. Zachary. "High Integrity Protection Systems". W ASME/JSME 2004 Pressure Vessels and Piping Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/pvp2004-3021.
Pełny tekst źródłaMiryasova, Lyudmila I., Shi Yongxing, Natalia N. Muravyeva i Olga V. Dymchenko. "Realisation of the Russian customs policy in the conditions of protection of the national market". W Sustainable and Innovative Development in the Global Digital Age. Dela Press Publishing House, 2022. http://dx.doi.org/10.56199/dpcsebm.yghb1113.
Pełny tekst źródłaIlar, M., i M. Wittwer. "Numerical Generator Protection Offers New Benefits of Gas Turbines". W ASME 1992 International Gas Turbine and Aeroengine Congress and Exposition. American Society of Mechanical Engineers, 1992. http://dx.doi.org/10.1115/92-gt-268.
Pełny tekst źródła"Fengxiang Color Protection Digital Protection in Shaanxi". W 2018 4th International Conference on Education & Training, Management and Humanities Science. Clausius Scientific Press, 2018. http://dx.doi.org/10.23977/etmhs.2018.29180.
Pełny tekst źródłaZhang, Hao, Jinghan He, Tony Yip i Z. Q. Bo. "Accelerate protection scheme in integrated protection system". W 2011 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies" (ISGT Europe). IEEE, 2011. http://dx.doi.org/10.1109/isgteurope.2011.6162719.
Pełny tekst źródłaШагапов, Илдар, i Рауф Яппаров. "ABOUTTECHNICALMEANS OF PROTECTION IN PROTECTION OF INFORMATION". W Информационные технологии обеспечения комплексной безопасности в цифровом обществе: сборник материалов V Всероссийской молодежной научно-практической конференции. Baskir State University, 2022. http://dx.doi.org/10.33184/itokbco-2022-05-20.10.
Pełny tekst źródłaRaporty organizacyjne na temat "Protection"
Imai, Susumu, Hajime Katayama i Kala Krishna. Protection for Sale or Surge Protection? Cambridge, MA: National Bureau of Economic Research, maj 2006. http://dx.doi.org/10.3386/w12258.
Pełny tekst źródłaFry, R. J. M. (Radiation protection). Office of Scientific and Technical Information (OSTI), grudzień 1986. http://dx.doi.org/10.2172/5601696.
Pełny tekst źródłaCanavan, G. H. Force protection. Office of Scientific and Technical Information (OSTI), grudzień 1998. http://dx.doi.org/10.2172/562589.
Pełny tekst źródłaCohen, Fred. Information Protection. Fort Belvoir, VA: Defense Technical Information Center, lipiec 1987. http://dx.doi.org/10.21236/ada236208.
Pełny tekst źródłaSwaja, R. (Radiation protection). Office of Scientific and Technical Information (OSTI), maj 1988. http://dx.doi.org/10.2172/7043227.
Pełny tekst źródłaSecrest, Jana, Jordan Douglas i Stephanie Archuleta. Radiation Protection. Office of Scientific and Technical Information (OSTI), listopad 2023. http://dx.doi.org/10.2172/2205033.
Pełny tekst źródłaCochran, Lainy, i Kevin Hart. Environmental Protection Agency Drinking Water Protective Action Guides Implementation Recommendations. Office of Scientific and Technical Information (OSTI), grudzień 2021. http://dx.doi.org/10.2172/1835989.
Pełny tekst źródłaSeverino, Felipe, Meta Brown i Rajashri Chakrabarti. Personal Bankruptcy Protection and Household Debt. Federal Reserve Bank of New York, kwiecień 2024. http://dx.doi.org/10.59576/sr.1099.
Pełny tekst źródłaTomko, John S., i Jr. Critical Infrastructure Protection. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2002. http://dx.doi.org/10.21236/ada401004.
Pełny tekst źródłaSaadawi, Tarek, Jr Jordan i Louis. Cyber Infrastructure Protection. Fort Belvoir, VA: Defense Technical Information Center, maj 2011. http://dx.doi.org/10.21236/ada543040.
Pełny tekst źródła