Добірка наукової літератури з теми "DC Security"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "DC Security".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "DC Security":

1

Turner, Billy G. "SECURITY: VA to DC." Proceedings of the Water Environment Federation 2006, no. 1 (January 1, 2006): 810–18. http://dx.doi.org/10.2175/193864706783789572.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Natsios, Deborah. "National Security Sprawl: Washington DC." Architectural Design 75, no. 6 (November 2005): 80–85. http://dx.doi.org/10.1002/ad.179.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ansari, Sakil Ahmad, and Jaychand Vishwakarma. "Survey on Database Concurrency Control in Multilevel Secure Database Management Systems." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (April 30, 2018): 105. http://dx.doi.org/10.23956/ijarcsse.v8i4.645.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Transactions are vital for database management systems (DBMSs) because they provide transparency to concurrency and failure. Concurrent execution of transactions may lead to contention for access to data, which in a multilevel secure DBMS (MLSIDBMS) may lead to insecurity. In this paper we examine security issues involved in database concurrency control for MLS/DBMSs and show how a scheduler can affect security. We introduce Data Conflict Security; (DC-Security) a property that implies a system is free of convert channels due to contention for access to data. We present a definition of DC Security based on noninterference. Two properties that constitute a necessary condition for DC-Security are introduced along with two other simpler necessary conditions. We have identified a class of schedulers we call Output-State-Equivalent for which another criterion implies DC-Security. The criterion considers separately the behavior of the scheduler in response to those inputs that cause rollback and those that do not. We characterize the security properties of several existing scheduling protocols and find many to be insecure
4

Haval, Abhijeet Madhukar. "Integration of Nonlinear Dynamics in Blockchain Security Protocols." Advances in Nonlinear Variational Inequalities 26, no. 2 (June 30, 2023): 94–109. http://dx.doi.org/10.52783/anvi.v26.i2.286.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Because of its ability to completely revamp current blockchain security methods, this connection is crucial. An effective safeguard against complex assaults, Nonlinear Dynamics (ND) adds a living, breathing component to consensus methods and cryptographic primitives. There is an urgent need for creative, nonlinear methods to strengthen blockchain security in light of present challenges including increasing attack vectors and risks posed by quantum computing. The suggested Dynamic Chaos-based Blockchain Security (DC-BS) system in this paper makes use of the chaotic dynamics present in ND to strengthen various aspects of blockchain security. Adaptive threat detection systems, dynamic consensus methods, and chaos-based encryption are all newly introduced in DC-BS. Validation of DC-BS's efficacy in preventing various attack scenarios through simulation studies demonstrates its advantages in reducing vulnerabilities and responding to new attack types. Various decentralized systems can benefit from DC-BS, including as supply chain management, the Internet of Things (IoT), conventional blockchain networks, and decentralized finance (DeFi). To strengthen the security of various decentralized applications, DC-BS works to increase trust, transparency, and resilience. The effectiveness of DCBS is confirmed by thorough simulation analyses that cover a wide range of attack scenarios, including double-spending assaults, Sybil attacks, and eclipse attacks. Based on the results of the simulations, DCBS is much more effective than conventional blockchain security procedures at reducing these risks. Showcased as well is the technique's capacity to react to changing attack techniques, highlighting its capacity to provide strong security even in dynamic settings.
5

Wang, Zhuodi, Kejun Li, Jun Liang, Kaiqi Sun, Jinyu Wang, and Zhijie Liu. "Coordinated Control Strategy of CU-MTDC under Abnormal Conditions Considering Power Supply Security." Applied Sciences 11, no. 4 (February 8, 2021): 1539. http://dx.doi.org/10.3390/app11041539.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The coastal urban multi-terminal DC (CU-MTDC) is a prospective solution for enhancing the power supply security of the coastal urban power (CUP) grid and integrating the large-scale offshore wind farm. However, the large DC disturbances may significantly impact the CUP power supply security. The existing DC unbalanced power distribution methods are difficult to be applied in the CU-MTDC because of the complicated optimization process and the expansion of the influence range of a DC fault. To solve the above problems, this paper proposes a coordinated control strategy of CU-MTDC under abnormal conditions. First, calculation principles for the active power reference of center coastal urban power (CCUP) grid converters are proposed. Second, a DC unbalanced power coordinated distribution strategy under abnormal conditions is used based on the dynamic priority control to ensure power supply security of the critical AC lines. Third, the controller parameters of CCUP grid converters are calculated. Through a simple control process, the number of the regulation converters is dynamically scheduled according to the DC unbalanced power. The DC fault influence range on the urban power grid can be limited in a sufficiently small area. Simulation verified the effectiveness of the proposed control strategy.
6

Ge, Huiyang, Hongbin Sun, and Bin Wang. "Multi-scale AC−DC system voltage security regions." Journal of Engineering 2019, no. 16 (March 1, 2019): 3354–58. http://dx.doi.org/10.1049/joe.2018.8592.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Drew, Michael E. "Covid-19, Investment Risk, and Retirement Security." Financial Planning Research Journal 6, no. 1 (December 1, 2020): 8–20. http://dx.doi.org/10.2478/fprj-2020-0001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACT Investment risk and retirement income security are constant bedfellows. This paper provides estimates of investment risk for defined contribution (DC) plan members to illustrate the importance of compounding (both positive and negative) during the accumulation phase of retirement saving and associated retirement income during the decumulation phase. In addition to workers being exposed to investment risk via their DC plan, older workers face significant COVID-19 related headwinds in the labour market. The cresting of investment risk with the current pandemic may create a lost generation of those approaching retirement (and recently retired) through lower contribution rates and an unfavourable path of returns.
8

Hussain, Talha, Rizwan Bin Faiz, Mohammad Aljaidi, Adnan Khattak, Ghassan Samara, Ayoub Alsarhan, and Raed Alazaidah. "Maximizing Test Coverage for Security Threats Using Optimal Test Data Generation." Applied Sciences 13, no. 14 (July 16, 2023): 8252. http://dx.doi.org/10.3390/app13148252.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As time continues to advance, the need for robust security threat mitigation has become increasingly vital in software. It is a constant struggle to maximize test coverage through optimal data generation. We conducted explanatory research to maximize test coverage of security requirements as modeled in the structured misuse case description (SMCD). The acceptance test case is designed through the structured misuse case description for mitigation of security threats. Mal activity is designed from SMCD upon which constraints are specified in object constraint language (OCL) in order to minimize human dependency and improve consistency in the optimal test case design. The study compared two state-of-the-art test coverage maximization approaches through optimal test data generation. It was evident through the results that MC/DC generated optimal test data, i.e., n + 1 test conditions in comparison to the decision coverage approach, i.e., 2n test conditions for security threats. Thus, MC/DC resulted in a significantly lower number of test cases yet maximized test coverage of security threats. We, therefore, conclude that MC/DC maximizes test coverage through optimal test data in comparison to decision coverage at the design level for security threat mitigation.
9

Goodman, J., A. P. Dancy, and A. P. Chandrakasan. "An energy/security scalable encryption processor using an embedded variable voltage DC/DC converter." IEEE Journal of Solid-State Circuits 33, no. 11 (1998): 1799–809. http://dx.doi.org/10.1109/4.726580.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

WANG, Lan, Chuanyu WANG, and Juan XUE. "Optimal Investment of Defined Contribution Pension Based on Self-Protection and Minimum Security." Wuhan University Journal of Natural Sciences 28, no. 2 (April 2023): 129–40. http://dx.doi.org/10.1051/wujns/2023282129.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper mainly studies the optimal investment problem of defined contribution (DC) pension under the self-protection and minimum security. First, we apply [see formula in PDF] theorem to obtain the differential equation of the real stock price after discounting inflation. Then, under the constraint of external guarantee of DC pension terminal wealth, self-protection is introduced to study the maximization of the expected utility of terminal wealth at retirement time and any time before retirement. The explicit solution of the optimal investment strategy of DC pension at retirement time and any time before retirement should be derived by martingale method. Finally, the influence of self-protection on the optimal investment strategy of DC pension is numerically analyzed.

Дисертації з теми "DC Security":

1

Eriksson, Robert. "Security-centered Coordinated Control in AC/DC Transmission Systems." Licentiate thesis, Stockholm : Royal Institute of Technology, 2008. http://kth.diva-portal.org/smash/record.jsf?searchId=4&pid=diva2:101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Stevens, Phillip W. "Considering security in Florida's transportation project development process." [Tampa, Fla] : University of South Florida, 2006. http://purl.fcla.edu/usf/dc/et/SFE0001508.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Register, David Lain Brian. "Programming homeland security citizen preparedness and the threat of terrorism /." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3922.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Fernandopulle, Nilkamal Alden Robert T. H. Findlay Raymond D. Tang Chi-keung. "Improved dynamic security assessment for AC/DC power systems using transient energy functions." *McMaster only, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mohanty, Pranab. "Learning from biometric distances : performance and security related issues in face recognition systems." [Tampa, Fla.] : University of South Florida, 2007. http://purl.fcla.edu/usf/dc/et/SFE0002298.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Schuessler, Joseph H. Windsor John C. "General deterrence theory assessing information systems security effectiveness in large versus small businesses /." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9829.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Young, Randall Frederick Windsor John C. "Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Pati, Nishikanta Guturu Parthasarathy. "Occlusion tolerant object recognition methods for video surveillance and tracking of moving civilian vehicles." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5133.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Meyer, Aric Tobolowsky Peggy M. "FISA and warrantless wire-tapping does FISA conform to fourth amendment standards? /." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9838.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Huang, Jian Li Hao. "FPGA implementations of elliptic curve cryptography and Tate pairing over binary field." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3963.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "DC Security":

1

DARPA Information Survivability Conference & Exposition (3rd 2003 Washington, D.C.). Proceedings: DARPA Information Survivability Conference and Exposition : Washington, DC, April 22-24, 2003. Los Alamitos, Calif: IEEE Computer Society, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

ACM, Workshop on Rapid Malcode (1st 2003 Washington D. C. ). WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 27, 2003. New York, N.Y: Association for Computing Machinery, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

United States. Congress. Senate. Committee on Appropriations. Homeland security: Hearings before the Committee on Appropriations, United States Senate, One Hundred Seventh Congress, second session : special hearings, April 10, 2002, Washington, DC; April 11, 2002, Washington, DC. Washington: U.S. G.P.O., 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

ACM, Conference on Computer and Communications Security (10th 2003 Washington D. C. ). Proceedings of the 10th ACM Conference on Computer and Communications Security: CCS 2003 : October 27-31, 2003, Washington, DC, USA. New York: ACM Press, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

ACM Conference on Computer and Communications Security (9th 2002 Washington, D.C.). Proceedings of the 9th ACM Conference on Computer and Communications Security: CCS 2002 : November 18-22, 2002, Washington, DC, USA. New York: ACM Press, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Appropriations, United States Congress Senate Committee on. Homeland security and the fiscal year 2002 supplemental appropriations bill: Hearing before the Committee on Appropriations, United States Senate, One Hundred Seventh Congress, second session, special hearings, April 30, 2002, Washington, DC; May 2, 2002, Washington, DC; May 7, 2002, Washington, DC. Washington: U.S. G.P.O., 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

D.C.) IEEE International Conference on Intelligence and Security Informatics (2012 Washington. 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012): Washington, DC, USA, 11-14 June 2012. Piscataway, NJ: IEEE, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

D.C.) ACM Workshop on Rapid Malcode (2nd 2004 Washington. WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 29, 2004, co-located with CSS 2004. New York, N.Y: Association for Computing Machinery, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

United States. Congress. Senate. Committee on Appropriations. Supplemental appropriations for fiscal year 2006: Hearings before the Committee on Appropriations, United States Senate, One Hundred Ninth Congress, second session, special hearings, March 7, 2006, Washington, DC, March 8, 2006, Washington, DC, March 9, 2006, Washington DC. Washington: U.S. G.P.O., 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

United States. Congress. House. Permanent Select Committee on Intelligence. Subcommittee on Intelligence Community Management. Security clearance reform: Hearing before the Subcommittee on Intelligence Community Management of the Permanent Select Committee on Intelligence, One Hundred Tenth Congress, first session, hearing held in Washington, DC, February 27, 2008. Washington: U.S. G.P.O., 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "DC Security":

1

Bleumer, Gerrit. "DC Network." In Encyclopedia of Cryptography and Security, 313–15. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_194.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bleumer, Gerrit. "Dining Cryptographers (DC) Network." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_194-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Zheng, Kai, Xiang Yao, and Wei Wang. "Reliability Evaluation of Smart DC Microgrid." In Advances in Artificial Intelligence and Security, 595–605. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06764-8_46.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Karpaga Priya, R., S. Kavitha, M. Malathi, P. Sinthia, and K. Suresh Kumar. "Single-Phase Bi-Directional AC/DC Converters for Fast DC Bus Voltage Controller." In Emerging Trends in Expert Applications and Security, 33–44. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1946-8_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Waye, Lucas, Pablo Buiras, Dan King, Stephen Chong, and Alejandro Russo. "It’s My Privilege: Controlling Downgrading in DC-Labels." In Security and Trust Management, 203–19. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24858-5_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Li, Long-Hai, Cheng-Qiang Huang, and Shao-Feng Fu. "Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net." In Network and System Security, 220–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bhaduri Mandal, Arkaprava, and Tanmoy Kanti Das. "Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC Coefficients." In Information Systems Security, 307–23. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Boroojeni, Kianoosh G., M. Hadi Amini, and S. S. Iyengar. "Error Detection of DC Power Flow Using State Estimation." In Smart Grids: Security and Privacy Issues, 31–51. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45050-6_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Marten, Anne-Katrin, Dirk Westermann, Lorenzo Vento, and Patrick Favre-Perrod. "Factors Influencing Oscillations within Meshed HVDC Grids and Implications for DC Voltage Control." In Critical Information Infrastructures Security, 178–89. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31664-2_19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Wang, Lirong. "Improved Method of Parallel DC-DC Boost Converter Based on Main Current Control." In The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, 566–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89511-2_73.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "DC Security":

1

Gonzalez-Longatt, F., C. Carmona-Delgado, J. Riquelme, M. Burgos, and J. L. Rueda. "Risk-based DC security assessment for future DC-independent system operator." In 2015 International Conference on Energy Economics and Environment (ICEEE). IEEE, 2015. http://dx.doi.org/10.1109/energyeconomics.2015.7235101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lewis, R. M., Hanhee Paik, S. K. Dutta, T. A. Palomaki, K. Mitra, B. K. Cooper, A. Przybysz, J. R. Anderson, C. J. Lobb, and F. C. Wellstood. "Some properties of a dc SQUID qubit." In Defense and Security Symposium, edited by Eric J. Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2006. http://dx.doi.org/10.1117/12.665081.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Choi, Won-seok, Hyun-suk Hwang, and Hyun-il Kang. "Aging algorithm for DC Train Facilities." In Information Security and Assurance 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.48.05.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Zhong, Xingsi, Lu Yu, Richard Brooks, and Ganesh Kumar Venayagamoorthy. "Cyber security in smart DC microgrid operations." In 2015 IEEE First International Conference on DC Microgrids (ICDCM). IEEE, 2015. http://dx.doi.org/10.1109/icdcm.2015.7152015.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Eriksson, Robert. "Security analysis of interconnected AC/DC systems." In 2015 Australasian Universities Power Engineering Conference (AUPEC). IEEE, 2015. http://dx.doi.org/10.1109/aupec.2015.7324794.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Chen, Weibo, Benjamin H. Cameron, Mark V. Zagarola, and Sri R. Narayanan. "A high pressure ratio DC compressor for tactical cryocoolers." In SPIE Defense + Security, edited by Richard I. Epstein, Bjørn F. Andresen, Markus P. Hehlen, Joseph P. Heremans, Ingo N. Rühlich, and Mansoor Sheik-Bahae. SPIE, 2016. http://dx.doi.org/10.1117/12.2224731.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Conroy, Joseph, Andrew Kehlenbeck, J. Sean Humbert, and William Nothwang. "Characterization and enhancement of micro brushless DC motor response." In SPIE Defense + Security, edited by Thomas George, M. Saif Islam, and Achyut K. Dutta. SPIE, 2014. http://dx.doi.org/10.1117/12.2051263.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Jevtic, Ruzica, Marko Ylitolva, and Lauri Koskinen. "Reconfigurable Switched Capacitor DC-DC Converter for Improved Security in IoT Devices." In 2018 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS). IEEE, 2018. http://dx.doi.org/10.1109/patmos.2018.8464158.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Jat, C. K., V. Bhardwaj, H. Ergun, and D. Van Hertem. "Security constrained OPF model for AC/DC grids with unbalanced DC systems." In 19th International Conference on AC and DC Power Transmission (ACDC 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.1342.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Smith, Barry. "Threat Detection DC to Daylight." In Optical Solutions for Homeland and National Security. Washington, D.C.: OSA, 2005. http://dx.doi.org/10.1364/oshs.2005.thc3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "DC Security":

1

Wei, Wenbin, Nigel Blampied, and Raajmaathangi Sreevijay. Evaluation, Comparison, and Improvement Recommendations for Caltrans Financial Programming Processes and Tools. Mineta Transportation Institute, February 2023. http://dx.doi.org/10.31979/mti.2023.2058.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The California Transportation Improvement Program System (CTIPS) is the main tool used by Caltrans’ Division of Financial Programming to support the business of transportation programming. It is a multi-agency joint-use project programming database system applied to develop and manage various state and federal transportation programming documents. The goal of this project is to evaluate CTIPS and explore various new options that will maintain the current functionality of CTIPS, meet legislative guidelines for ADA compliance, ensure security of the system, and have sufficient scalability and capabilities for integration with other systems in the future. The research is based on the review of current and historical documents, interviews, and surveys of the customers of the Division of Financial Programming; the survey of programming systems used by the other 49 states and District of Columbia (DC) in the U.S.; an interview with the CTIPS service support provider; and interviews and surveys of the software companies that provide services and products similar to CTIPS. This research identifies risks associated with CTIPS and opportunities for improvements; compares the processes in California with currently recognized best practices and with those used in the other states in the U.S.; and makes recommendations for the improvement of CTIPS. Research results could help Caltrans better capture current data needs and future analytics requirements and make an informed decision about modernizing and upgrading an essential programming database.
2

Health hazard evaluation summary report: HETA-2003-0206-3067, evaluation of radiation exposure to TSA baggage screeners, Transportation Security Administration, Washington, DC. U.S. Department of Health and Human Services, Public Health Service, Centers for Disease Control and Prevention, National Institute for Occupational Safety and Health, August 2008. http://dx.doi.org/10.26616/nioshheta200302063067.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії